Journal of Northeastern University Natural Science ›› 2014, Vol. 35 ›› Issue (12): 1692-1696.DOI: 10.12068/j.issn.1005-3026.2014.12.005

• Information & Control • Previous Articles     Next Articles

A Kind of Threshold Proxy Signature Scheme with Nonrepudiation Property

LIU Dan-ni, WANG Xing-wei, HUANG Min   

  1. School of Information Science &Engineering, Northeastern University, Shenyang 110819, China.
  • Received:2013-09-24 Revised:2013-09-24 Online:2014-12-15 Published:2014-09-12
  • Contact: WANG Xing-wei
  • About author:-
  • Supported by:
    -

Abstract: To overcome the drawbacks, such as high computational complexity and heavy communication, in the present threshold proxy signature schemes, a nonrepudiable threshold proxy signature scheme was proposed. To improve the security,when a signer applies for public key certificate to the CA, the CA validates the signer′s private key associated with the signer′s public key by the method of zero-knowledge proof. To improve the efficiency, in the phase of proxy key generation, original signer only needs to calculate and broadcast a public proxy share to the proxy group, and the group members generate their own proxy keys concurrently. Comparing with the schemes that original signer generates proxy keys one by one for all the proxy members, the amount of calculation was greatly reduced by the proposed method. The security model of three types of adversaries was proposed. It was simulated that the adversaries forge the signature. The new scheme was proved to be secure by the simulation process.

Key words: cryptography, proxy signature, threshold proxy signature, zero-knowledge proof, adversary

CLC Number: