%0 Journal Article
%T A (t,n) Threshold Proxy Signature Scheme with Specified Verifiers
指定验证人的(t,n)门限代理签名方案
%A WANG Xiao-Ming
%A FU Fang-Wei
%A
王晓明
%A 符方伟
%J 软件学报
%D 2005
%I
%X concept of specified verifiers is first introduced into the threshold proxy signature, and a (t,n) threshold proxy signature scheme with the specified verifiers is proposed. In the proposed scheme, any t or more proxy signers can sign a message on behalf of an original signer for the specified verifiers, and only the specified verifiers together are able to verify the validity of the proxy signature. In ordinary (t,n) proxy threshold signature schemes, anyone can verify the validity of the proxy signature. In some applications, however, it is required that a proxy signature could be verified only by the specified verifiers together, that is, no a verifier can gain an advantage of the knowledge of the validity of the proxy signature before the other verifiers know its validity (e.g. tenders, bits). Furthermore, the proposed scheme can also revoke the proxy signature right of the proxy signers delegated by the original signer if original signer needs.
%K digital signature
%K threshold proxy signature
%K signature for specified verifiers
数字签名
%K 门限代理签名
%K 指定验证人签名
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=7735F413D429542E610B3D6AC0D5EC59&aid=30F61D32403E97EE&yid=2DD7160C83D0ACED&vid=7801E6FC5AE9020C&iid=B31275AF3241DB2D&sid=C9D6A9952042973F&eid=D7FC8AF637611368&journal_id=1000-9825&journal_name=软件学报&referenced_num=2&reference_num=7