A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM

被引:0
|
作者
Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China [450004 ]
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
<正>Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furthermore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    [J]. Journal of Electronics(China), 2006, (01) : 54 - 57
  • [2] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [3] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [4] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [5] New self certified proxy digital signature scheme based on elliptic curve cryptosystem
    Xiao, Youan
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 723 - 726
  • [6] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [7] A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
    Chen, TS
    Chung, YF
    Huang, KH
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (01) : 137 - 145
  • [8] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61
  • [9] An elliptic curve proxy signature scheme
    Xiao, Youan
    Zhou, Zude
    Li, Layuan
    [J]. DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
  • [10] Signature scheme with forward security based on elliptic curve cryptosystem
    Liu, Yali
    Yin, Xinchun
    Zhu, Hong
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1118 - 1123