|
|
A Secure Threshold Proxy Signature Scheme |
Wang Xiao-ming①; Zhang Zhen①; Fu Fang-wei② |
①Department of Computer Science, Jinan University, Guangzhou 510632, China;
②School of Mathematics Science, Nankai University, Tianjin 300071, China |
|
|
Abstract A secure threshold proxy signature scheme is proposed aiming at conspiracy attack, that is, any t (t is threshold value) or more malicious proxy signatures may work together to reconstruct the secret polynomial of the proxy group and derive the secret keys of other members in the proxy group, consequently they can impersonate some other proxy signers to generate a valid threshold proxy signature. The new scheme can not only satisfy the properties of the threshold proxy signature, but also withstand the conspiracy attack. Furthermore, the proxy signer’s proxy signing capability can be revoked if the original signer needs.
|
Received: 19 November 2004
|
|
|
|
|
|
|
|