Home // SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies // View article


Threshold Proxy Signature Based on Position

Authors:
Qingshui Xue
Fengying Li
Zhenfu Cao

Keywords: position, threshold proxy signature, proxy signature, UC security, model, scheme

Abstract:
Position-based cryptography has attracted lots of researchers’ attention. In the mobile Internet, there are many position-based security applications. For the first time, one new conception, threshold proxy signature based on positions is proposed. Based on one secure positioning protocol, one model of threshold proxy signature based on positions is proposed. In the model, positioning protocols are bound to threshold proxy signature tightly, not loosely. Further, we propose one position-based threshold proxy signature scheme, its correctness is proved, and its security is analyzed. As far as we know, it is the first threshold proxy signature scheme based on positions.

Pages: 151 to 156

Copyright: Copyright (c) IARIA, 2014

Publication date: November 16, 2014

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-376-6

Location: Lisbon, Portugal

Dates: from November 16, 2014 to November 20, 2014