• 沒有找到結果。

A Novel Efficient (t,n) Threshold Proxy Signature Scheme

N/A
N/A
Protected

Academic year: 2022

Share "A Novel Efficient (t,n) Threshold Proxy Signature Scheme"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: A Novel Efficient (t,n) Threshold Proxy Signature Scheme 作者: Huang, H. F.;Chang, C. C.

關鍵詞: Proxy signature;Threshold proxy signature scheme;Discrete logarithm;Lagrange interpolation

日期: 2006-03

上傳時間: 2009-12-17T06:58:23Z 出版者: Asia University

摘要: All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential

computations and communications to obtain and verify a shared secret.

Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t, n) threshold proxy signature scheme based on Schnorr?s scheme. Compared with existing (t, n) threshold proxy signature schemes, our scheme can reduce the amount of computations and

communications. In our method, not only the original signer can know who generated the proxy signature, but also the receiver can certify the

actuality of the group signers who made the proxy signature. We offer convenience and fair distribution of auditing a document?s signers.

(2)

參考文獻

相關文件

Improve macro-average F-measure: 0.333 → 0.511 Five-fold cross validation for better thresholds Threshold T j = average of five thresholds. Tuning threshold significantly

Unlike the case of optimizing the micro-average F-measure, where cyclic optimization does not help, here the exact match ratio is slightly improved for most data sets.. 5.5

In this chapter, a dynamic voltage communication scheduling technique (DVC) is proposed to provide efficient schedules and better power consumption for GEN_BLOCK

We also propose a Unified Code Management Schemes to eliminate code blocking completely and the reassignment cost will be reduced as far as possible based on CIDP.. Our schemes

In this thesis, we present a Threshold Jumping (TJ) and a Warp-Around Scan (WAS) techniques aim to coordinate simultaneous communications in high density RFID

In this thesis, we have proposed a new and simple feedforward sampling time offset (STO) estimation scheme for an OFDM-based IEEE 802.11a WLAN that uses an interpolator to recover

According to the problem statement and literature reviews, several functionalities are identified for the proposed CBI-PSP, including: (1) a knowledge classifications scheme

A decision scheme based on OWA operator for an evaluation programme: an approximate reasoning approach. A decision scheme based on OWA operator for an evaluation programme: