{"title":"一种新的前向安全阈值代理重签名方案","authors":"Xiaodong Yang, Caifen Wang, Yulei Zhang, Weiyi Wei","doi":"10.1109/ICNIDC.2009.5360842","DOIUrl":null,"url":null,"abstract":"A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time. It implies that past proxy re-signatures remain secure if the current re-signature key is leaked. The scheme is provably robust, forward-secure and unforgettable without relying on the random oracle model. The scheme has many attractive applications, such as the construction of the interoperable system of digital rights management (DRM).","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A new forward-secure threshold proxy re-signature scheme\",\"authors\":\"Xiaodong Yang, Caifen Wang, Yulei Zhang, Weiyi Wei\",\"doi\":\"10.1109/ICNIDC.2009.5360842\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time. It implies that past proxy re-signatures remain secure if the current re-signature key is leaked. The scheme is provably robust, forward-secure and unforgettable without relying on the random oracle model. The scheme has many attractive applications, such as the construction of the interoperable system of digital rights management (DRM).\",\"PeriodicalId\":127306,\"journal\":{\"name\":\"2009 IEEE International Conference on Network Infrastructure and Digital Content\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Network Infrastructure and Digital Content\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNIDC.2009.5360842\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Network Infrastructure and Digital Content","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNIDC.2009.5360842","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new forward-secure threshold proxy re-signature scheme
A forward-secure threshold proxy re-signature scheme in the standard model is firstly proposed in this paper. The scheme has the property that it is infeasible to forge valid proxy re-signatures relating to the past even if more than or equal to the threshold proxies are corrupted. Re-signature keys are updated at regular periods of time. It implies that past proxy re-signatures remain secure if the current re-signature key is leaked. The scheme is provably robust, forward-secure and unforgettable without relying on the random oracle model. The scheme has many attractive applications, such as the construction of the interoperable system of digital rights management (DRM).