Home // SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies // View article
Threshold Proxy Signature Based on Position
Authors:
Qingshui Xue
Fengying Li
Zhenfu Cao
Keywords: position, threshold proxy signature, proxy signature, UC security, model, scheme
Abstract:
Position-based cryptography has attracted lots of researchers’ attention. In the mobile Internet, there are many position-based security applications. For the first time, one new conception, threshold proxy signature based on positions is proposed. Based on one secure positioning protocol, one model of threshold proxy signature based on positions is proposed. In the model, positioning protocols are bound to threshold proxy signature tightly, not loosely. Further, we propose one position-based threshold proxy signature scheme, its correctness is proved, and its security is analyzed. As far as we know, it is the first threshold proxy signature scheme based on positions.
Pages: 151 to 156
Copyright: Copyright (c) IARIA, 2014
Publication date: November 16, 2014
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-376-6
Location: Lisbon, Portugal
Dates: from November 16, 2014 to November 20, 2014