Back
ID-based, proxy, threshold signature scheme
Authors:
- Jacek Pomykała,
- Henryk Kułakowski,
- Piotr Sapiecha,
- Błażej Grela
Abstract
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
- Record ID
- WUTe3448e7b68574f4dae9d84ec2464ffdf
- Author
- Journal series
- International Journal of Electronics and Telecommunications, ISSN 2081-8491, e-ISSN 2300-1933, [0867-6747]
- Issue year
- 2021
- Vol
- 67
- No
- 2
- Pages
- 201-205
- Keywords in English
- ID-based, proxy, threshold, signature, scheme
- ASJC Classification
- ;
- DOI
- DOI:10.24425/ijet.2021.135965 Opening in a new tab
- URL
- http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2021.135965 Opening in a new tab
- Language
- eng (en) English
- File
-
- File: 1
- 2021 Kułakowski ID-Based Proxy Treshold Signature Scheme.pdf
-
- Score (nominal)
- 70
- Score source
- journalList
- Score
- = 70.0, 27-04-2022, ArticleFromJournal
- Publication indicators
- : 2018 = 0.592
- Uniform Resource Identifier
- https://repo.pw.edu.pl/info/article/WUTe3448e7b68574f4dae9d84ec2464ffdf/
- URN
urn:pw-repo:WUTe3448e7b68574f4dae9d84ec2464ffdf
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or PerishOpening in a new tab system.