DocumentCode :
480061
Title :
Chained Threshold Proxy Signature without and with Supervision
Author :
Jiang, Zoe L. ; Yiu, S.M. ; Hui, L.C.K. ; Dong, Y. ; Wong, S.H.Y.
Author_Institution :
Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong
Volume :
3
fYear :
2008
fDate :
12-14 Dec. 2008
Firstpage :
837
Lastpage :
840
Abstract :
Threshold proxy signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n subordinates without revealing his own private key, such that a subgroup of at least t les n subordinates is required to generate a proxy signature. In reality, the situation can be more complicated. First of all, the subgroup may further delegate proxy signing capabilities to another subgroup of subordinates (in the form of a chain). This is a group-to-group delegation problem. In addition, a supervising agent (SA) may be introduced to supervise the subordinates, such that proxy signing can only be successfully executed with SApsilas agreement. This is a delegation with supervision problem. These two extensions of delegation problems are not solved yet. This paper designs two provably secure cryptographic schemes chained threshold proxy signature (CTPS) scheme and chained threshold proxy signature with supervision (CTPSwS) scheme to solve these two delegation problems.
Keywords :
digital signatures; private key cryptography; chained threshold proxy signature with supervision scheme; cryptographic schemes chained threshold proxy signature; group-to-group delegation problem; private key; supervising agent; Computer science; Cryptography; Digital signatures; Forward contracts; Programming; Security; Software development management; Software engineering; Software maintenance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Software Engineering, 2008 International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-3336-0
Type :
conf
DOI :
10.1109/CSSE.2008.1353
Filename :
4722473
Link To Document :
بازگشت