Abstract
Nowadays, proxy signature is one of research hotspots in the field of information technology. However, most researches focus on the theory and its analysis, there is few application researches, in particular, applications based on threshold proxy signature are less than others. In the real life, there are many drawbacks in the local oral defense system and more and more unfairness has been shown. Based on the threshold proxy signature scheme from the bilinear-pairing, online oral defense system is proposed. The system consists of main sever, oral defense experts, oral defense students, oral defense secretary and CA (Certificate Authority). It mainly characterizes easily confirming oral defense experts authorized by main server and the oral defense experts can’t deny their own oral defense suggestions submitted. Threshold is a practical processing way in the system. As long as the number of oral defense experts agreeing reaches the number requested, i.e., the threshold value t, related students pass the oral defense procedure. The research opens a new windows for the application of proxy signature technology in remote education and it is very important for us to popularize online oral defense system and enhance the security of modern remote education including online oral defense system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature for Delegating Signing Operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Dehli, India, pp. 48–57. ACM Press, New York (1996)
Boneh, D., Lynn, B., Shacham, H.: Short Signature from the Well Pairing. In: Advances in Cryptology-Asiacrypt 2001, Springer, Heidelberg (2001)
Wang, C.: Study on the Applications of Undeniable Signature and Proxy Signature. XIDIAN University, Xi’an (2003) (in Chinese)
Yi, L.: Study on Proxy Signature Schemes and Their Applications. Xi’an XIDIAN University, Xi’an (2000)
Zhang, J., Wang, H.: New proxy blind signature scheme and its application in electronic cash. Application Research of Computers 26(1), 347–358 (2009)
Wu, M., Wang, R.: A study on the Application of proxy blind signature in electronic commerce based on mobile agent technology. Journal of Nanjing University of Posts and Telecommunications 25(5), 84–94 (2005)
Xue, Q.S.: Design, Cryptanalysis and Implementation of Novel Proxy Signature Protocols. Shanghai Jiaotong University (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, F., Xue, Q. (2011). Online Oral Defense System Based on Threshold Proxy Signature. In: Wu, Y. (eds) Computing and Intelligent Systems. ICCIC 2011. Communications in Computer and Information Science, vol 234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24091-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-24091-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24090-4
Online ISBN: 978-3-642-24091-1
eBook Packages: Computer ScienceComputer Science (R0)