The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2003 vol.15)
pp: 1552-1560
ABSTRACT
<p><b>Abstract</b>—In a <tmath>(t,n)</tmath> threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of <tmath>n</tmath> members. Any <tmath>t</tmath> or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but <tmath>(t-1)</tmath> or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the discrete logarithm problem and do not satisfy all proxy requirements. In this paper, we propose a practical, efficient, and secure <tmath>(t,n)</tmath> threshold proxy signature scheme based on the RSA cryptosystem. Our scheme satisfies all proxy requirements and uses only a simple Lagrange formula to share the proxy signature key. Furthermore, our scheme requires only 5 percent of the computational overhead and 8 percent of the communicational overhead required in Kim's scheme.</p>
INDEX TERMS
Lagrange interpolating polynomial, RSA cryptosystem, threshold proxy signature.
CITATION
Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem", IEEE Transactions on Knowledge & Data Engineering, vol.15, no. 6, pp. 1552-1560, November/December 2003, doi:10.1109/TKDE.2003.1245292
58 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool