JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15]


Journal of Information Science and Engineering, Vol. 33 No. 1, pp. 63-79


Traceable Threshold Proxy Signature


KE GU1,2, YONG WANG2 AND SHENG WEN3
1
School of Computer and Communication Engineering
Changsha University of Science and Technology
Changsha, 410114 P.R. China

2School of Information Science and Engineering
Central South University
Changsha, 410083 P.R. China

3School of Information Technology
Deakin University
 Melbourne, 3217 Australia
E-mail:
{gk4572@163.com}


    Threshold proxy signature (TPS) is a variant of proxy signature, which allows that a delegator may delegate his signing rights to many proxy signers. Compared with proxy signature, threshold proxy signature can limitedly prevent that some of proxy signers abuse their signing rights. In this paper, we show a traceable threshold proxy signature (TTPS) frame. Also, we propose a traceable (t, n) threshold proxy signature scheme, which is based on the Waters’signature scheme and the Xiong et al.’s threshold signature scheme in the standard model. The proposed scheme is proved to have a security reduction to the CDH assumption and the threshold proxy signature unforgeability under an adaptive chosen message attack, and to have the threshold proxy signature traceability. Compared with other (t, n) threshold proxy signature schemes, the proposed scheme is secure in the standard model.


Keywords: threshold proxy signature, traceability, provable security, CDH, standard model

  Retrieve PDF document (JISE_201701_05.pdf)