Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2009, Vol. 35 ›› Issue (4): 128-130.

• Security Technology • Previous Articles     Next Articles

Threshold Proxy Re-signature Scheme

SUN Chao-liang, CAO Zhen-fu, LIANG Xiao-hui   

  1. (Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-02-20 Published:2009-02-20

门限代理重签名方案

孙超亮,曹珍富,梁晓辉   

  1. (上海交通大学计算机科学与工程系,上海 200240)

Abstract: The paper proposes a new threshold proxy re-signature scheme. In the standard proxy re-signature scheme, a semi-trusted proxy can transform Alice’s signature into Bob’s signature on the same message, but in this scheme there are n semi-trusted proxies between the two signers and the re-signature generation can be performed if and only if there are at least t proxies. This scheme holds the features of proxy re-signature and threshold signature, so it is especially suitable for some complicated checking and voting system.

Key words: digital signature, proxy re-signature, threshold signature

摘要: 提出一个新的门限代理重签名方案。标准的代理重签名方案是通过一个半可信任的代理者将一个签名者的签名转化为另一个签名者的签名,而该文提出的方案中2个签名者之间有n个半可信任的代理者,当且仅当至少有t个代理者参与时才能得到重签名。该方案具有门限签名方案和代理重签名方案的特点,适合应用于程序比较多的审查系统和投票系统。

关键词: 数字签名, 代理重签名, 门限签名

CLC Number: