ID-based, Proxy, Threshold Signature Scheme
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. Th...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Polish Academy of Sciences
2021-05-01
|
Series: | International Journal of Electronics and Telecommunications |
Subjects: | |
Online Access: | https://journals.pan.pl/Content/118886/PDF/29_3222_Pomyka%C5%82a_L_sk_new.pdf |
Summary: | We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed. |
---|---|
ISSN: | 2081-8491 2300-1933 |