Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (3): 206-213    DOI: 10.1631/jzus.C0910493
    
A secure threshold Paillier proxy signature scheme
Pei-yih TING*, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU
Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 20224, Taiwan, China
A secure threshold Paillier proxy signature scheme
Pei-yih TING*, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU
Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 20224, Taiwan, China
 全文: PDF(220 KB)  
摘要: As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in many e-commerce applications such as e-voting, e-bidding/auction, and privacy-preserving data mining. These two schemes are existentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these two schemes are practical for integration in modularized secure multi-party protocols.
关键词: Paillier proxy signatureThreshold schemeSecure multi-party protocolsCryptographic primitives    
Abstract: As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in many e-commerce applications such as e-voting, e-bidding/auction, and privacy-preserving data mining. These two schemes are existentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these two schemes are practical for integration in modularized secure multi-party protocols.
Key words: Paillier proxy signature    Threshold scheme    Secure multi-party protocols    Cryptographic primitives
收稿日期: 2009-08-11 出版日期: 2010-03-01
CLC:  TP309.7  
通讯作者: Pei-yih TING     E-mail: pyting@mail.ntou.edu.tw
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Pei-yih TING
Xiao-wei HUANG
Jun-hui WU
Chia-huei HSEU

引用本文:

Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU. A secure threshold Paillier proxy signature scheme. Front. Inform. Technol. Electron. Eng., 2010, 11(3): 206-213.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910493        http://www.zjujournals.com/xueshu/fitee/CN/Y2010/V11/I3/206

[1] Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON:面向普适计算的超轻量低功耗加密设计[J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18(3): 332-345.
[2] Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao. NTRU格上基于身份签名的高效方案[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 135-142.
[3] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS:一种利用用户空间文件系统的图片存储透明加密技术[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.