Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"

In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. I...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Guilin, BAO, Feng, ZHOU, Jianying, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2004
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1086
https://ink.library.smu.edu.sg/context/sis_research/article/2085/viewcontent/Comments_Threshold.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2085
record_format dspace
spelling sg-smu-ink.sis_research-20852019-03-11T02:37:03Z Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem" WANG, Guilin BAO, Feng ZHOU, Jianying DENG, Robert H. In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al with the performance of a scheme that has been proposed by the authors of this article earlier and proposed an advanced secure (t, n) threshold proxy signature scheme. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the proposed scheme is secure and efficient against notorious conspiracy attacks. 2004-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1086 info:doi/10.1109/TKDE.2004.52 https://ink.library.smu.edu.sg/context/sis_research/article/2085/viewcontent/Comments_Threshold.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Proxy signature digital signature public key cryptosystem data security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Proxy signature
digital signature
public key cryptosystem
data security
Information Security
spellingShingle Proxy signature
digital signature
public key cryptosystem
data security
Information Security
WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
description In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al with the performance of a scheme that has been proposed by the authors of this article earlier and proposed an advanced secure (t, n) threshold proxy signature scheme. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the proposed scheme is secure and efficient against notorious conspiracy attacks.
format text
author WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
author_facet WANG, Guilin
BAO, Feng
ZHOU, Jianying
DENG, Robert H.
author_sort WANG, Guilin
title Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
title_short Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
title_full Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
title_fullStr Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
title_full_unstemmed Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
title_sort comments on "a practical (t, n) threshold proxy signature scheme based on the rsa cryptosystem"
publisher Institutional Knowledge at Singapore Management University
publishDate 2004
url https://ink.library.smu.edu.sg/sis_research/1086
https://ink.library.smu.edu.sg/context/sis_research/article/2085/viewcontent/Comments_Threshold.pdf
_version_ 1770570850320252928