An elliptic curve proxy signature scheme

被引:0
|
作者
Xiao, Youan [1 ]
Zhou, Zude [1 ]
Li, Layuan [1 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
关键词
digital signature; proxy digital signature; elliptic curve; elliptic curve discrete logarithmic problems; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new controllable proxy digital signature scheme based on the elliptic curve cryptosystem is proposed to solve the problems that most of the known proxy digital signature schemes cannot provide the overall, complete, reliable control ability on the stretch of proxy digital signature power. It has the ability to provide the overall, reliable control on the using of proxy digital signing power. In addition, it has been applied for the Chinese patent of invention (200510019214.4). Furthermore, we also analyzed the computational complexity and security about the proposed scherne. The proposed scheme, which is an extension of elliptic curve cryptosystems, is beneficial for the study on the domain for the proxy digital signature. It can be applied in many domains, such as Electronic Commerce, Distributed Network Computing, etc.
引用
收藏
页码:1151 / 1154
页数:4
相关论文
共 50 条
  • [1] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [2] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [3] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [4] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [5] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    [J]. JournalofElectronics, 2006, (01) : 54 - 57
  • [6] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    [J]. Journal of Electronics(China), 2006, (01) : 54 - 57
  • [7] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [8] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [9] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [10] A new proxy multi-signature scheme and the elliptic curve cryptography
    Cheng, Xu
    Li, MingChu
    Zhao, Kaiqin
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, : 180 - 184