Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2006, Vol. 29 ›› Issue (4): 103-106.doi: 10.13190/jbupt.200604.103.lily

• Reports • Previous Articles     Next Articles

A Threshold Proxy Signature Scheme with Actual Signers

LI Li-yuan , XU Qiu-liang   

  1. School of Computer Science and Technology, Shandong University, Jinan 250061,China
  • Received:2005-07-13 Revised:1900-01-01 Online:2006-08-30 Published:2006-08-30
  • Contact: LI Li-yuan

Abstract:

Based on improvement of authentication method of typical proxy signature scheme, the secret share was distributed by a proxy group administrator。A threshold proxy signature scheme with known signers was proposed. The scheme has the non-repudiation property. The non-repudiation property provides the scheme the ability to identify the actual signers of the proxy signature, and then to avoid the abuse of signatures. Furthermore, the proposed scheme can withstand conspiracy attack.

Key words: proxy signature, conspiracy attack, non-repudiation

CLC Number: