Secure Undeniable Threshold Proxy Signature Scheme

Abstract

The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group to cooperatively sign message on behalf of an original signer. In this paper, we propose a new scheme which includes the features and benefits of the RSA scheme. Also, we will evaluate the security of undeniable threshold proxy signature scheme with known signers. We find that the existing threshold proxy scheme is insecure against the original signer forgery. In this paper, we show the cryptanalysis of an existed scheme. Additional, we propose the secure, undeniable and known signers threshold proxy signature scheme which answers the drawback of an existed scheme. We also demonstrate that a threshold proxy signature suffers from a conspiracy of an original signer and a secret share dealer, that the scheme is commonly forgeable, and cannot offer undeniable. We claim that the proposed scheme offers the undeniable characteristic.

Authors and Affiliations

Sattar Aboud

Keywords

Related Articles

An Analysis on Natural Image Small Patches

The method of computational homology is used to analyze natural image 8 × 8 and 9x9-patches locally. Our experimental results show that there exist subspaces of the spaces of 8x8 and 9x9-patches that are topologically eq...

AN OPEN CLOUD MODEL FOR EXPANDING HEALTHCARE INFRASTRUCTURE

With the rapid improvement of computation facilities, healthcare still suffers limited storage space and lacks full utilization of computer infrastructure. That not only adds to the cost burden but also limits the possib...

Introducing Multi Shippers Mechanism for Decentralized Cash on Delivery System

One of the major problems of e-commerce globally is the selling and buying of goods among the parties over the Internet in which the traders may not trust their partners. Cash on delivery allows customers to pay in cash...

FPGA Implementation of RISC-based Memory-centric Processor Architecture

The development of the microprocessor industry in terms of speed, area, and multi-processing has resulted with increased data traffic between the processor and the memory in a classical processor-centric Von Neumann comp...

 Contextual Modelling of Collaboration System

 Faced with new environmental constraints, firms decide to collaborate in collective entities and adopt new patterns of behavior. So, this firms’ collaboration becomes an unavoidable approach. Indeed, our aim intere...

Download PDF file
  • EP ID EP152225
  • DOI 10.14569/IJACSA.2014.050109
  • Views 86
  • Downloads 0

How To Cite

Sattar Aboud (2014). Secure Undeniable Threshold Proxy Signature Scheme. International Journal of Advanced Computer Science & Applications, 5(1), 63-68. https://europub.co.uk/articles/-A-152225