A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems

被引:0
|
作者
Lu, Dianjun [1 ]
Zhang, Bingru [1 ]
Wang, Yun [2 ]
Li, Xinyan [3 ]
机构
[1] Qinghai Normal Univ, Dept Math & Informat Sci, Xining, Peoples R China
[2] Qinghai Univ, Grown Up Edu Coll, Qinghai, Peoples R China
[3] Changjiang Normal Coll, Dept Math, Chongqing, Peoples R China
关键词
digital signature; proxy signature; threshold proxy signature; elliptic curve cryptosystems;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of proposed threshold proxy signature schemes have been based on discrete logarithms which required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential operations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems (ECC for short). Compared with existing (t,n) threshold proxy signature schemes, our scheme can not only reduce the amount of computations and communications, but alse Integrate the short secret key characteristic of ECC. In our method, the original signer can know who generated the proxy signature, and the receiver can certify the actuality of the group signers who made the proxy signature.
引用
收藏
页码:4586 / +
页数:2
相关论文
共 50 条
  • [1] Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve
    WANG Hua-qun1
    2.Applied Mathematics and Physics Department
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 165 - 168
  • [2] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [3] (t, n) Threshold group signature scheme based on elliptic curve cryptosystem
    School of Electr. and Inf. Eng., Dalian Univ. of Technol., Dalian 116024, China
    [J]. Dalian Ligong Daxue Xuebao, 2007, 3 (429-432):
  • [4] A novel efficient (t, n) threshold proxy signature scheme
    Huang, HF
    Chang, CC
    [J]. INFORMATION SCIENCES, 2006, 176 (10) : 1338 - 1349
  • [5] An elliptic curve proxy signature scheme
    Xiao, Youan
    Zhou, Zude
    Li, Layuan
    [J]. DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
  • [6] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [7] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [8] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61
  • [9] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [10] (t,k,n) Multi- blind proxy Signature Scheme on Elliptic Curve
    Liu Guang-liang
    Xie Sheng-xian
    Fu Wei
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 291 - 294