Title :
Threshold Proxy Re-Signature
Author :
Yang, Piyi ; Cao, Zhenfu ; Dong, Xiaolei
Author_Institution :
Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai
Abstract :
The focus of this paper is to design an efficient and secure solution addressing the key escrow problem in proxy re-signature schemes, i.e., the proxy knows the user\´s private key, which damages the essential requirement - "non-repudiation" property of proxy re-signature schemes. In this paper, we first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese\´s (see ACM CCS, p.310-319, 2005) and Shao Jun\´s (see Progress in Cryptology - INDOCRYPT 2007, vol.4859 of LNCS, p.197-209, 2007) approach. To our knowledge, there is no threshold proxy re-signature scheme that has been formally presented yet.
Keywords :
private key cryptography; key escrow problem; private key; secret sharing schemes; security model; threshold proxy resignature; Computer science; Cryptography; Design engineering; Proposals; Public key; Security;
Conference_Titel :
Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE International
Conference_Location :
Austin, Texas
Print_ISBN :
978-1-4244-3368-1
Electronic_ISBN :
1097-2641
DOI :
10.1109/PCCC.2008.4745095