会议专题

ID-Based Bidirectional Threshold Proxy Re-Signature

Based on Shao et als ID-based proxy re-signature, an ID-based bidirectional threshold proxy re-signature scheme in the standard model is presented in this paper. Our scheme eliminates the cost of restoring and managing certificates, and solves the difficult problem of excessive rights of the proxy in the proxy re-signature scheme. The scheme can tolerate t<n/2 malicious proxies. Our scheme proves robust and secure against existential forgery under the adaptive chosen identity and message attacks, assuming that the computation Diffie-Hellman assumption holds.

Threshold proxy re-signature Identity-based Provable secure Standard model

Zhao Ying Ma Wei

Northwest University for Nationalities Key Laboratory of Chinas National Linguistic Information Tec Northwest University for Nationalities School of Management, Northwest University for Nationalities

国际会议

2011 International Conference on Information and Industrial Electronics(2011年信息与工业电子国际会议 ICIIE 2011)

成都

英文

886-889

2011-01-14(万方平台首次上网日期,不代表论文的发表时间)