The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment

被引:0
|
作者
Kim, KS [1 ]
Kim, JB [1 ]
Yang, HK [1 ]
机构
[1] Induk Inst Technol, Dept Broadcasting & Telecommun, Seoul, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
C. Gamage et al. proposed a "proxy-signcryption scheme" that combines proxy signatures proposed by M. Mambo and a signcryption scheme proposed by Y. Zheng. However, their scheme has some disadvantages that proxy agent cannot be protected because the original signer can create a valid proxy-signcryption instead of proxy agent and an additional revocation protocol is needed if original signer wants to change the proxy agent. To solve these problems, we propose an improved proxy-signcryption scheme based on a proxy-protected proxy signature for partial delegation with warrant introduced by S.J. Kim and ECKCDSA(Elliptic Curve Korea Certificated based Digital Signature Algorithm). Our proposed scheme can protect proxy agent and no additional computation is needed when a proxy right is change and is efficiency because of using ECKCSA in the view of computation complexity.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [41] Position-Based Proxy Signcryption
    Xue, Qingshui
    Shen, Jiachen
    Li, Fengying
    Cao, Zhenfu
    Ge, Guojian
    [J]. 2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [42] Construction of Certificateless Proxy Signcryption Scheme From CMGs
    Yu, Huifang
    Wang, Zhicang
    [J]. IEEE ACCESS, 2019, 7 : 141910 - 141919
  • [43] A Proxy Re-signcryption Scheme with Delegation Property
    Alamer, Abdulrahman
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 243 - 259
  • [44] A proxy based efficient checkpointing scheme for fault recovery in mobile Grid system
    Rao, Imran
    Imran, Nomica
    Lee, PilWoo
    Huh, Eui-Nam
    Chung, TaeChoong
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2006, PROCEEDINGS, 2006, 4297 : 448 - +
  • [45] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [46] An efficient and provable certificate-based proxy signature scheme for IIoT environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Obaidat, Mohammad S.
    He, Debiao
    Singh, Harendra
    [J]. INFORMATION SCIENCES, 2020, 518 : 142 - 156
  • [47] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [48] A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment
    Mathi, Senthilkumar
    Anbarasi, P. N.
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 942 - 951
  • [49] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    [J]. Int. J. Secur. Netw., 2008, 3 (206-215):
  • [50] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197