Journal of Shanghai Jiaotong University

• Automation Technique, Computer Technology • Previous Articles     Next Articles

(t, k, l)-Threshold Proxy Signature Without Random Oracle

ZHANG Hai1,DONG Xiaolei1,CAO Zhenfu1,CAO Feng2   


  1. (1.Department of Computer Science & Engineering, Shanghai Jiaotong University,
    Shanghai 200240, China; 2.School of Mathematics and Information, Shanghai Lixin University of
    Commerce, Shanghai 201620, China )
  • Received:2008-12-26 Revised:1900-01-01 Online:2010-08-31 Published:2010-08-31

Abstract: To generalize the concept of (t,l)threshold proxy signature scheme, this paper proposed a (t, k, l)threshold proxy signature scheme, in which any k or more proxy signers in a designated proxy group of l members can cooperatively issue a proxy signature and this scheme can also tolerate at most t-1 corrupted signers. The security model of existential unforgeability for the threshold proxy signature scheme was presented, then a (t +1, 2t +1, l)threshold proxy signature scheme based on the hardness of CDH problem was proposed, and the existential unforgeability was proved under this security model. At the same time, this scheme has the properties of distinguishability and proxy protected.

CLC Number: