The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment

被引:0
|
作者
Kim, KS [1 ]
Kim, JB [1 ]
Yang, HK [1 ]
机构
[1] Induk Inst Technol, Dept Broadcasting & Telecommun, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
C. Gamage et al. proposed a "proxy-signcryption scheme" that combines proxy signatures proposed by M. Mambo and a signcryption scheme proposed by Y. Zheng. However, their scheme has some disadvantages that proxy agent cannot be protected because the original signer can create a valid proxy-signcryption instead of proxy agent and an additional revocation protocol is needed if original signer wants to change the proxy agent. To solve these problems, we propose an improved proxy-signcryption scheme based on a proxy-protected proxy signature for partial delegation with warrant introduced by S.J. Kim and ECKCDSA(Elliptic Curve Korea Certificated based Digital Signature Algorithm). Our proposed scheme can protect proxy agent and no additional computation is needed when a proxy right is change and is efficiency because of using ECKCSA in the view of computation complexity.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [1] Parallel Proxy-Signcryption Scheme in Cloud Environment
    Deng Wenping
    Wu Xuguang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 402 - 406
  • [2] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [3] Identity based proxy-signcryption scheme from pairings
    Li, XX
    Chen, KF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
  • [4] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [5] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [6] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [7] Cryptanalysis and improvement of a proxy-protected signature scheme
    Hu, Xiaoming
    Zhang, Zhe
    Wang, Tong
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
  • [8] An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
    Li, Li
    Zhou, Siqin
    Choo, Kim-Kwang Raymond
    Li, Xiaohong
    He, Debiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] Efficient identity based proxy-signcryption schemes with forward security and public verifiability
    Wang, M
    Li, H
    Liu, ZJ
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 982 - 991
  • [10] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264