Identity-based multi-proxy threshold signature scheme
碩士 === 逢甲大學 === 資訊工程所 === 95 === We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate managemen...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/68572252859043360980 |
id |
ndltd-TW-095FCU05392098 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095FCU053920982015-10-13T11:31:56Z http://ndltd.ncl.edu.tw/handle/68572252859043360980 Identity-based multi-proxy threshold signature scheme 身分識別金鑰多人代理門檻式簽章 Shao-nung Huang 黃劭農 碩士 逢甲大學 資訊工程所 95 We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate management, (b) riginal signers and proxy signers are both allowed to be a group (c) only t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer group, (d) the first and the third proposed schemes, we allow anyone join the original group without reset the system, (e) we support anonymity ability for the second and the third proposed schemes, (f ) in traceable scheme, if it’s necessary we can trace the co-signers of a certain signature. Furthermore, our proxy signature scheme is shown to be secure against forgery attacks. Jenshiuh Liu 劉振緒 2007 學位論文 ; thesis 43 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 逢甲大學 === 資訊工程所 === 95 === We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate management, (b) riginal signers and proxy signers are both allowed to be a group (c) only t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer group, (d) the first and the third proposed schemes, we allow anyone join the original group without reset the system, (e) we support anonymity ability for the second and the third proposed schemes, (f ) in traceable scheme, if it’s necessary we can trace the co-signers of a certain signature. Furthermore, our proxy signature scheme is shown to be secure against forgery attacks.
|
author2 |
Jenshiuh Liu |
author_facet |
Jenshiuh Liu Shao-nung Huang 黃劭農 |
author |
Shao-nung Huang 黃劭農 |
spellingShingle |
Shao-nung Huang 黃劭農 Identity-based multi-proxy threshold signature scheme |
author_sort |
Shao-nung Huang |
title |
Identity-based multi-proxy threshold signature scheme |
title_short |
Identity-based multi-proxy threshold signature scheme |
title_full |
Identity-based multi-proxy threshold signature scheme |
title_fullStr |
Identity-based multi-proxy threshold signature scheme |
title_full_unstemmed |
Identity-based multi-proxy threshold signature scheme |
title_sort |
identity-based multi-proxy threshold signature scheme |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/68572252859043360980 |
work_keys_str_mv |
AT shaonunghuang identitybasedmultiproxythresholdsignaturescheme AT huángshàonóng identitybasedmultiproxythresholdsignaturescheme AT shaonunghuang shēnfēnshíbiéjīnyàoduōréndàilǐménkǎnshìqiānzhāng AT huángshàonóng shēnfēnshíbiéjīnyàoduōréndàilǐménkǎnshìqiānzhāng |
_version_ |
1716845746808946688 |