Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (3): 206-213    DOI: 10.1631/jzus.C0910493
    
A secure threshold Paillier proxy signature scheme
Pei-yih TING*, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU
Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 20224, Taiwan, China
Download:   PDF(220KB)
Export: BibTeX | EndNote (RIS)      

Abstract  As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in many e-commerce applications such as e-voting, e-bidding/auction, and privacy-preserving data mining. These two schemes are existentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these two schemes are practical for integration in modularized secure multi-party protocols.

Key wordsPaillier proxy signature      Threshold scheme      Secure multi-party protocols      Cryptographic primitives     
Received: 11 August 2009      Published: 01 March 2010
CLC:  TP309.7  
Cite this article:

Pei-yih TING, Xiao-wei HUANG, Jun-hui WU, Chia-huei HSEU. A secure threshold Paillier proxy signature scheme. Front. Inform. Technol. Electron. Eng., 2010, 11(3): 206-213.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910493     OR     http://www.zjujournals.com/xueshu/fitee/Y2010/V11/I3/206


A secure threshold Paillier proxy signature scheme

As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in many e-commerce applications such as e-voting, e-bidding/auction, and privacy-preserving data mining. These two schemes are existentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these two schemes are practical for integration in modularized secure multi-party protocols.

关键词: Paillier proxy signature,  Threshold scheme,  Secure multi-party protocols,  Cryptographic primitives 
[1] Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.
[2] Jia Xie, Yu-pu Hu, Jun-tao Gao, Wen Gao. Efficient identity-based signature over NTRU lattice[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 135-142.
[3] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS: a transparent cryptography for stored images using a filesystem in userspace[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.