ID-based, Proxy, Threshold Signature Scheme

We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. Th...

Full description

Bibliographic Details
Main Authors: Jacek Pomykała, Henryk Kułakowski, Piotr Sapiecha, Błażej Grela
Format: Article
Language:English
Published: Polish Academy of Sciences 2021-05-01
Series:International Journal of Electronics and Telecommunications
Subjects:
Online Access:https://journals.pan.pl/Content/118886/PDF/29_3222_Pomyka%C5%82a_L_sk_new.pdf
Description
Summary:We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
ISSN:2081-8491
2300-1933