Skip to main content

Online Oral Defense System Based on Threshold Proxy Signature

  • Conference paper
  • 1430 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 234))

Abstract

Nowadays, proxy signature is one of research hotspots in the field of information technology. However, most researches focus on the theory and its analysis, there is few application researches, in particular, applications based on threshold proxy signature are less than others. In the real life, there are many drawbacks in the local oral defense system and more and more unfairness has been shown. Based on the threshold proxy signature scheme from the bilinear-pairing, online oral defense system is proposed. The system consists of main sever, oral defense experts, oral defense students, oral defense secretary and CA (Certificate Authority). It mainly characterizes easily confirming oral defense experts authorized by main server and the oral defense experts can’t deny their own oral defense suggestions submitted. Threshold is a practical processing way in the system. As long as the number of oral defense experts agreeing reaches the number requested, i.e., the threshold value t, related students pass the oral defense procedure. The research opens a new windows for the application of proxy signature technology in remote education and it is very important for us to popularize online oral defense system and enhance the security of modern remote education including online oral defense system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  2. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature for Delegating Signing Operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Dehli, India, pp. 48–57. ACM Press, New York (1996)

    Google Scholar 

  3. Boneh, D., Lynn, B., Shacham, H.: Short Signature from the Well Pairing. In: Advances in Cryptology-Asiacrypt 2001, Springer, Heidelberg (2001)

    Google Scholar 

  4. Wang, C.: Study on the Applications of Undeniable Signature and Proxy Signature. XIDIAN University, Xi’an (2003) (in Chinese)

    Google Scholar 

  5. Yi, L.: Study on Proxy Signature Schemes and Their Applications. Xi’an XIDIAN University, Xi’an (2000)

    Google Scholar 

  6. Zhang, J., Wang, H.: New proxy blind signature scheme and its application in electronic cash. Application Research of Computers 26(1), 347–358 (2009)

    Google Scholar 

  7. Wu, M., Wang, R.: A study on the Application of proxy blind signature in electronic commerce based on mobile agent technology. Journal of Nanjing University of Posts and Telecommunications 25(5), 84–94 (2005)

    Google Scholar 

  8. Xue, Q.S.: Design, Cryptanalysis and Implementation of Novel Proxy Signature Protocols. Shanghai Jiaotong University (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, F., Xue, Q. (2011). Online Oral Defense System Based on Threshold Proxy Signature. In: Wu, Y. (eds) Computing and Intelligent Systems. ICCIC 2011. Communications in Computer and Information Science, vol 234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24091-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24091-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24090-4

  • Online ISBN: 978-3-642-24091-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics