(t,k,n) Multi- blind proxy Signature Scheme on Elliptic Curve

被引:0
|
作者
Liu Guang-liang [1 ]
Xie Sheng-xian [1 ]
Fu Wei [1 ]
机构
[1] Liaocheng Univ, Coll Comp Sci, Liaocheng, Shandong, Peoples R China
关键词
blind proxy signature; (t; k; n) secret sharing matrix; elliptic curve;
D O I
10.4028/www.scientific.net/AMM.130-134.291
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme. In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better can prevent a malicious user's forgery attack and have the security properties of proxy signature.
引用
收藏
页码:291 / 294
页数:4
相关论文
共 50 条
  • [1] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [2] An elliptic curve proxy signature scheme
    Xiao, Youan
    Zhou, Zude
    Li, Layuan
    [J]. DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
  • [3] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems
    Lu, Dianjun
    Zhang, Bingru
    Wang, Yun
    Li, Xinyan
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
  • [4] A new proxy multi-signature scheme and the elliptic curve cryptography
    Cheng, Xu
    Li, MingChu
    Zhao, Kaiqin
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, : 180 - 184
  • [5] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [6] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [7] A new multi-proxy multi-signature scheme based on elliptic curve cryptography
    Dang Minh Tuan
    Nguyen Anh Viet
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109
  • [8] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [9] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    [J]. JournalofElectronics, 2006, (01) : 54 - 57
  • [10] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    [J]. Journal of Electronics(China), 2006, (01) : 54 - 57