首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Proxy Multisignature Scheme with (t, m) Threshold Shared Verification
作者姓名:WANG  Xiaoming  CHEN  Huoyan  ZHANG  Zhen
作者单位:College of Information and Technology, Jinan University,Guangzhou 510632, Guangdong, China
基金项目:Foundation item: Supported by the Natural Science Foundation of Guangdong Province (04300708)
摘    要:A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more etffcient for signature and verification etc.

关 键 词:代理服务器  安全技术  加密技术  计算机
文章编号:1007-1202(2007)01-0091-04
收稿时间:2006-04-20

Proxy multisignature scheme with (<Emphasis Type="Italic">t,m</Emphasis>) threshold shared verification
WANG Xiaoming CHEN Huoyan ZHANG Zhen.Proxy multisignature scheme with (t,m) threshold shared verification[J].Wuhan University Journal of Natural Sciences,2007,12(1):91-94.
Authors:Wang Xiaoming  Chen Huoyan  Zhang Zhen
Institution:(1) College of Information and Technology, Jinan University, Guangzhou, 510632, Guangdong, China
Abstract:A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more efficient for signature and verification etc.
Keywords:cryptography  proxy multisignature  threshold shared verification
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号