Threshold Proxy Re-signature Scheme with Privacy
Abstract—A proxy signature scheme allows a designated party to sign on behalf of the original signer. However, a dishonest proxy signer can manage to sign arbitrary messages and jeopardize the original signer’s benefit. Alternatively, a proxy re-signature scheme allows the original signer to delegate his signing right in a decentralized manner, to a delegatee and a semi-trusted transformer. In order to protect the privacy of the delegatee, a proxy re-signature scheme with privacy consideration was recently introduced. In this paper, we integrate the idea of threshold delegation into a proxy re-signature scheme with privacy consideration and the resulting scheme is useful in a new delegating scenario of signing right delegation.
Index Terms—Privacy, proxy re-signature, threshold delegation.
Kuan-Yu Chen and Hsi-Chung Lin are with the Department of Computer Science and Information Engineering, Aletheia University, No.32, ZhenliSt., Danshui Dist., New Taipei City 25103, Taiwan, R.O.C. (e-mail:fm990055@ mail.au.edu.tw; hclin@ mail.au.edu.tw).
Cite: Kuan-Yu Chen and Hsi-Chung Lin, "Threshold Proxy Re-signature Scheme with Privacy," International Journal of Computer and Electrical Engineering vol. 5, no. 1, pp. 98-103, 2013.
General Information
What's New
-
Jun 03, 2019 News!
IJCEE Vol. 9, No. 2 - Vol. 10, No. 2 have been indexed by EI (Inspec) Inspec, created by the Institution of Engineering and Tech.! [Click]
-
May 13, 2020 News!
IJCEE Vol 12, No 2 is available online now [Click]
-
Mar 04, 2020 News!
IJCEE Vol 12, No 1 is available online now [Click]
-
Dec 11, 2019 News!
The dois of published papers in Vol 11, No 4 have been validated by Crossref
-
Oct 11, 2019 News!
IJCEE Vol 11, No 4 is available online now [Click]
- Read more>>