Skip to main content

An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner

  • Conference paper
Information Security (ISC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5222))

Included in the following conference series:

  • 1393 Accesses

Abstract

In this paper we propose and analyze a new RSA-based proxy signature scheme and its corresponding (t,n) threshold scheme. Unlike numerous previous research works, the threshold proxy scheme does not require any trusted combiner and is thus a truly practical approach. The security of both schemes is based on a weaker version of the RSA assumption. Both schemes are unforgeable and especially the threshold proxy scheme inherits the merit of its predecessor - Shoup’s RSA threshold scheme - and thus is secure under a multi-party computation setup with active adversaries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proceedings of the First ACM Conference on Computer and Communications Security (1993)

    Google Scholar 

  2. Chang, Y.F., Chang, C.C.: An RSA-based (t, n) Threshold Proxy Signature Scheme with Free-will Identities. International Journal of Information and Computer Security 1(1/2), 201–209 (2007)

    Article  Google Scholar 

  3. Chaum, D., Pedersen, T.: Wallet Databases with Observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)

    Google Scholar 

  4. Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Proceedings of The International Workshop on Practice and Theory in Public Key Cryptography (PKC). LNCS, vol. 1992, pp. 119–136 (2001)

    Google Scholar 

  5. Damgård, I., Koprowski, M.: Practical Threshold RSA Signatures Without a Trusted Dealer. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 152–165. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Goldreich, O.: Foundations of cryptography - a primer. Foundations and Trends in Theoretical Computer Science 1(1), 1–116 (2005)

    Article  MathSciNet  Google Scholar 

  7. Hwang, M.S., Lu, J.L., Lin, I.C.: A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engineering 15(6) (2003)

    Google Scholar 

  8. Kuo, W.C., Chen, M.Y.: A Modified (t, n) Threshold Proxy Signature Scheme based on the RSA cryptosystem. In: Proceedings of the Third International Conference on Information Technology and Applications (ICITA) (2005)

    Google Scholar 

  9. Mambo, M., Usuda, K., Okmamoto, E.: Proxy Signatures for Delegating Signing Operation. In: Proceedings of 3rd ACM Conference Computer and Communication Security, pp. 48–57 (1996)

    Google Scholar 

  10. Mambo, M., Usuda, K., Okmamoto, E.: Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Transactions on Fundamentals E79-A(9), 1338–1353 (1996)

    Google Scholar 

  11. Rivest, R.L., Kaliski, B.: RSA Problem (2003), theory.lcs.mit.edu/~rivest/RivestKaliski-RSAProblem.pdf

  12. Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  13. Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Wang, G., Bao, F., Zhou, J., Deng, R.H., Lin, I.C.: Comments on ”A practical (t, n) Threshold Proxy Signature Scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and Data Engineering, 16(10) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tzong-Chen Wu Chin-Laung Lei Vincent Rijmen Der-Tsai Lee

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ting, Py., Huang, XW. (2008). An RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted Combiner. In: Wu, TC., Lei, CL., Rijmen, V., Lee, DT. (eds) Information Security. ISC 2008. Lecture Notes in Computer Science, vol 5222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85886-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85886-7_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85884-3

  • Online ISBN: 978-3-540-85886-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics