首页    期刊浏览 2024年08月22日 星期四
登录注册

文章基本信息

  • 标题:Secure Chained Threshold Proxy Signature without and with Supervision
  • 本地全文:下载
  • 作者:Zoe L. JIANG ; S. M. YIU ; Y. DONG
  • 期刊名称:Journal of Software Engineering and Applications
  • 印刷版ISSN:1945-3116
  • 电子版ISSN:1945-3124
  • 出版年度:2009
  • 卷号:2
  • 期号:4
  • 页码:267-275
  • DOI:10.4236/jsea.2009.24034
  • 出版社:Scientific Research Publishing
  • 摘要:Threshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n2 sub-ordinates without revealing his own private key, such that a subgroup of at least t2 ≤ n2 subordinates is required to generate a proxy signature. In reality, the situation can be more complicated. First of all, the subgroup may further delegate their proxy signing capabilities to another group of n3 subordinates such that at least another subgroup of at least t3 ≤ n3 subordinates are of the proxy signing capabilities (in the form of a chain). t2 can be unequal to t3 depending on the concrete requirement. This is a group-to-group delegation problem. In addition, a supervising agent (SA) may be introduced in the above chain to supervise the subordinates, such that proxy signing can only be successfully executed with SA’s agreement. This is a delegation with supervision problem in the threshold delegation chain described above. These two extensions of delegation problems are not solved yet. This paper designs two provably secure cryptographic schemes Chained Threshold Proxy Signature (CTPS) scheme and Chained Threshold Proxy Signature with Supervision (CTPSwS) scheme to solve these two delegation problems.
  • 关键词:Delegation; Threshold Proxy Signature; Chained Threshold Proxy Signature with Supervision
国家哲学社会科学文献中心版权所有