Skip to main content
Log in

A universal composability framework for analysis of proxy threshold signature

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols. In this framework, the security of protocols is maintained under a general protocol composition operation. In the paper, we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area. The proposed scheme is suitable for the mobile agents, which should migrate across different environment through network. Furthermore, we give the concrete analysis of the reduction to prove the security of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zhang K. Threshold proxy signature schemes [C]//Proceeding of the 1997 information security workshop. Heidelberg: Springer, 1998: 191–197.

    Google Scholar 

  2. Kim S, Park S, Won D. Proxy signatures, revisited [C]// ICICS’97, LNCS. Heidelberg: Springer, 1997: 223–232.

    Google Scholar 

  3. Sun H, Lee N, Hwang T. Threshold proxy signatures [C]//IEE Proceeding of Computers and Digital technique/ New York: IEEE Computer Society Press, 1999: 259–263.

    Google Scholar 

  4. Hsu C, Wu T, Wong D. New nonrepudiable threshold proxy signature scheme with known signers [J]. Journal of Systems and Software, 2001, 58(1): 119–124.

    Article  Google Scholar 

  5. Hwang M, Lu J, Lin L. A practical (t, n) threshold proxy signature scheme based on the RSA Cryptosystem [C]//ACISP 2004, LNCS. Heidelberg: Springer, 2004: 348–357.

    Google Scholar 

  6. Wang G, Bao G, Zhou J, et al. Comments on a practical threshold proxy signature scheme based on the RSA cryptosystem [J]. IEEE Transaction on Knowledge and Data Engineering, 2004: 16(10): 1309–1311.

    Article  Google Scholar 

  7. Kuo W, Chen M. A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem [C]//ICITA’05. New York: IEEE Computer Society Press, 2005: 576–579.

    Google Scholar 

  8. Farmer W, Gutmann J, Swarup V. Security for mobile agents: Authentication and state appraisal [C]//ESoRICS 1996, LNCS. Heidelberg: Springer, 1996: 118–130.

    Google Scholar 

  9. Canetti R. Universally composable security: A new paradigm for cryptographic protocols [C]//Proceedings of the 42th IEEE Symposium on Foundations of Computer Science. New York: IEEE Computer Society Press, 2001: 136–145.

    Google Scholar 

  10. Canetti R, Rabin T. Universal composition with joint state [C]//Crypto 2003, LNCS. Heidelberg: Springer, 2003: 265–281.

    Google Scholar 

  11. Canetti R. Universally composable signature, certification, and authentication [C]//Proceedings of the 17th IEEE workshop on Computer Security Foundations. New York: IEEE Computer Society Press, 2004: 112–116

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Hong  (洪 璇).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 60703031,60703004), the National High Technology Research and Development Program (863) of China (No. 2006AA01Z4220, and the National Basic Research Program (973) of China (No. 2007CB311201)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hong, X., Li, Xx., Gong, Z. et al. A universal composability framework for analysis of proxy threshold signature. J. Shanghai Jiaotong Univ. (Sci.) 14, 107–111 (2009). https://doi.org/10.1007/s12204-009-0107-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-009-0107-2

Key words

CLC number

Navigation