Provably secure proxy-protected signature schemes based on factoring

被引:15
|
作者
Zhou, Y [1 ]
Cao, ZF [1 ]
Lu, RX [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
RSA; factoring; proxy signature; proxy-protected signature; Random Oracle Model;
D O I
10.1016/j.amc.2004.04.032
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Proxy signature is all active cryptographic research topic, and a wide range of literature can be found nowadays, which suggest improvement and generalization of existing protocols in various direction. However, most of previously proposed schemes in these literature are based on discrete logarithm problem. To our best knowledge, there still does not exist an indeed proxy signature scheme based on integer factorization problem. In this paper, we propose two efficient provably secure proxy-protected signature scheme ill Random Oracle Model. The first scheme is based on RSA problem and the second one is based oil integer factorization problem. Compared to early proxy signature schemes, our schemes are more efficient and easy to implement. We believe they are particularly suitable for low-computation devices, Such as smart cards, cell phones, pages etc. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 98
页数:16
相关论文
共 50 条
  • [1] Attacks on provably secure proxy-protected signature schemes based on factoring
    Wu, Chia-Chi
    Chang, Chin-Chen
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
  • [2] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [3] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [4] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [5] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [6] Factoring based proxy signature schemes
    Xue, Qingshui
    Cao, Zhenfu
    [J]. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2006, 195 (1-2) : 229 - 241
  • [7] Proxy signature schemes based on factoring
    Shao, Z
    [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (03) : 137 - 143
  • [8] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [9] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [10] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264