File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Secure chained threshold proxy signature without and with supervision

TitleSecure chained threshold proxy signature without and with supervision
Authors
KeywordsDelegation
Threshold Proxy Signature
Chained Threshold Proxy Signature with Supervision
Issue Date2009
PublisherScientific Research Publishing Inc..
Citation
Journal of Software Engineering and Applications, 2009, v. 2 n. 4, p. 267-275 How to Cite?
AbstractThreshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n2 sub-ordinates without revealing his own private key, such that a subgroup of at least t2 ≤ n2 subordinates is required to generate a proxy signature. In reality, the situation can be more complicated. First of all, the subgroup may further delegate their proxy signing capabilities to another group of n3 subordinates such that at least another subgroup of at least t3 ≤ n3 subordinates are of the proxy signing capabilities (in the form of a chain). t2 can be unequal to t3 depending on the concrete requirement. This is a group-to-group delegation problem. In addition, a supervising agent (SA) may be introduced in the above chain to supervise the subordinates, such that proxy signing can only be successfully executed with SA’s agreement. This is a delegation with supervision problem in the threshold delegation chain described above. These two extensions of delegation problems are not solved yet. This paper designs two provably secure cryptographic schemes Chained Threshold Proxy Signature (CTPS) scheme and Chained Threshold Proxy Signature with Supervision (CTPSwS) scheme to solve these two delegation problems.
Persistent Identifierhttp://hdl.handle.net/10722/129987
ISSN

 

DC FieldValueLanguage
dc.contributor.authorJiang, ZLen_US
dc.contributor.authorYiu, SMen_US
dc.contributor.authorDong, Yen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorWong, SHYen_US
dc.date.accessioned2010-12-23T08:45:10Z-
dc.date.available2010-12-23T08:45:10Z-
dc.date.issued2009en_US
dc.identifier.citationJournal of Software Engineering and Applications, 2009, v. 2 n. 4, p. 267-275en_US
dc.identifier.issn1945-3116-
dc.identifier.urihttp://hdl.handle.net/10722/129987-
dc.description.abstractThreshold Proxy Signature (TPS) scheme facilitates a manager to delegate his signing capability to a group of n2 sub-ordinates without revealing his own private key, such that a subgroup of at least t2 ≤ n2 subordinates is required to generate a proxy signature. In reality, the situation can be more complicated. First of all, the subgroup may further delegate their proxy signing capabilities to another group of n3 subordinates such that at least another subgroup of at least t3 ≤ n3 subordinates are of the proxy signing capabilities (in the form of a chain). t2 can be unequal to t3 depending on the concrete requirement. This is a group-to-group delegation problem. In addition, a supervising agent (SA) may be introduced in the above chain to supervise the subordinates, such that proxy signing can only be successfully executed with SA’s agreement. This is a delegation with supervision problem in the threshold delegation chain described above. These two extensions of delegation problems are not solved yet. This paper designs two provably secure cryptographic schemes Chained Threshold Proxy Signature (CTPS) scheme and Chained Threshold Proxy Signature with Supervision (CTPSwS) scheme to solve these two delegation problems.-
dc.languageengen_US
dc.publisherScientific Research Publishing Inc..-
dc.relation.ispartofJournal of Software Engineering and Applicationsen_US
dc.subjectDelegation-
dc.subjectThreshold Proxy Signature-
dc.subjectChained Threshold Proxy Signature with Supervision-
dc.titleSecure chained threshold proxy signature without and with supervisionen_US
dc.typeArticleen_US
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1945-3116 &volume=2&issue=4&spage=267&epage=275&date=2009&atitle=Secure+chained+threshold+proxy+signature+without+and+with+supervision-
dc.identifier.emailJiang, ZL: ljiang@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hken_US
dc.identifier.emailDong, Y: ydong@cs.hku.hk-
dc.identifier.emailHui, LCK: hui@cs.hku.hk-
dc.identifier.emailWong, SHY: shywong@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207en_US
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.doi10.4236/jsea.2009.24034-
dc.identifier.hkuros177381en_US
dc.identifier.volume2en_US
dc.identifier.issue4en_US
dc.identifier.spage267en_US
dc.identifier.epage275en_US
dc.identifier.issnl1945-3116-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats