A robust (k, n) + 1 threshold proxy signature scheme based on factoring

Abstract Proxy signature is an active cryptographic research area. Since Mambo et al. introduced the concept of proxy signature in 1996, many proxy signature schemes have been proposed. However, most of these previously proposed schemes are based on discrete logarithm problems. In this paper, we would like to propose a new robust ( k ,  n ) + 1 threshold proxy signature scheme based on factoring. In this scheme, generating a valid proxy signature needs not only any k or more members in n proxy signers but also a trusted dealer to cooperatively sign a message. To our best knowledge, this is the first ( k ,  n ) + 1 threshold proxy signature scheme based on factoring.

[1]  Zhenfu Cao A threshold key escrow scheme based on public key cryptosystem , 2001 .

[2]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[3]  Sihan Qing,et al.  Threshold Undeniable RSA Signature Scheme , 2001, ICICS.

[4]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[5]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[6]  Hung-Min Sun,et al.  Time-Stamp Proxy Signature with Traceable Receivers , 1999 .

[7]  Wang Gui IMPROVEMENT OF SHOUP'S THRESHOLD RSA SIGNATURE SCHEME , 2002 .

[8]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[9]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[10]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[11]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[12]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[13]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[14]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[15]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[16]  Cao Zhen Two Classes of Robust Threshold Key Escrow Schemes , 2003 .

[17]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .