Identity-based multi-proxy threshold signature scheme

碩士 === 逢甲大學 === 資訊工程所 === 95 === We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate managemen...

Full description

Bibliographic Details
Main Authors: Shao-nung Huang, 黃劭農
Other Authors: Jenshiuh Liu
Format: Others
Language:en_US
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/68572252859043360980
id ndltd-TW-095FCU05392098
record_format oai_dc
spelling ndltd-TW-095FCU053920982015-10-13T11:31:56Z http://ndltd.ncl.edu.tw/handle/68572252859043360980 Identity-based multi-proxy threshold signature scheme 身分識別金鑰多人代理門檻式簽章 Shao-nung Huang 黃劭農 碩士 逢甲大學 資訊工程所 95 We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate management, (b) riginal signers and proxy signers are both allowed to be a group (c) only t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer group, (d) the first and the third proposed schemes, we allow anyone join the original group without reset the system, (e) we support anonymity ability for the second and the third proposed schemes, (f ) in traceable scheme, if it’s necessary we can trace the co-signers of a certain signature. Furthermore, our proxy signature scheme is shown to be secure against forgery attacks. Jenshiuh Liu 劉振緒 2007 學位論文 ; thesis 43 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 逢甲大學 === 資訊工程所 === 95 === We present three identity-based multi-proxy threshold signature schemes. First one is easier to manage. the second one is anonymity, the third one is anomymity and traceable. The main features of our proposed work are: (a)ID-based scheme reduces certificate management, (b) riginal signers and proxy signers are both allowed to be a group (c) only t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer group, (d) the first and the third proposed schemes, we allow anyone join the original group without reset the system, (e) we support anonymity ability for the second and the third proposed schemes, (f ) in traceable scheme, if it’s necessary we can trace the co-signers of a certain signature. Furthermore, our proxy signature scheme is shown to be secure against forgery attacks.
author2 Jenshiuh Liu
author_facet Jenshiuh Liu
Shao-nung Huang
黃劭農
author Shao-nung Huang
黃劭農
spellingShingle Shao-nung Huang
黃劭農
Identity-based multi-proxy threshold signature scheme
author_sort Shao-nung Huang
title Identity-based multi-proxy threshold signature scheme
title_short Identity-based multi-proxy threshold signature scheme
title_full Identity-based multi-proxy threshold signature scheme
title_fullStr Identity-based multi-proxy threshold signature scheme
title_full_unstemmed Identity-based multi-proxy threshold signature scheme
title_sort identity-based multi-proxy threshold signature scheme
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/68572252859043360980
work_keys_str_mv AT shaonunghuang identitybasedmultiproxythresholdsignaturescheme
AT huángshàonóng identitybasedmultiproxythresholdsignaturescheme
AT shaonunghuang shēnfēnshíbiéjīnyàoduōréndàilǐménkǎnshìqiānzhāng
AT huángshàonóng shēnfēnshíbiéjīnyàoduōréndàilǐménkǎnshìqiānzhāng
_version_ 1716845746808946688