Abstract

Most of proposed threshold proxy signature schemes have been based on discrete logarithms which required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential operations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems (ECC for short). Compared with existing (t,n) threshold proxy signature schemes, our scheme can not only reduce the amount of computations and communications, but alse integrate the short secret key characteristic of ECC. In our method, the original signer can know who generated the proxy signature, and the receiver can certify the actuality of the group signers who made the proxy signature.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.