Efficient self-certified proxy CAE scheme and its variants

被引:7
|
作者
Wu, Tzong-Sun [2 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
关键词
Self-certified; Proxy signature; Authenticated encryption; Convertible; AUTHENTICATED ENCRYPTION SCHEMES; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.jss.2008.12.040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an authenticated ciphertext on behalf of the original signer. To satisfy the requirement of confidentiality, only the designated recipient is capable of decrypting the ciphertext and verifying the proxy signature. A significant advantage of the proposed schemes is that the proxy signature conversion process takes no extra cost, i.e., when the case of a later dispute over repudiation occurs, the designated recipient can easily reveal the ordinary proxy signature for the public arbitration. If needed, the designated recipient can also convince anyone that he is the real recipient. In addition, integrating with self-certified public key systems, our schemes can earn more computational efficiency, since authenticating the public key and verifying the proxy signature can be simultaneously carried out within one-step. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:974 / 980
页数:7
相关论文
共 50 条
  • [21] Self-certified multi-proxy signature schemes with message recovery
    Tzong-sun WU
    Chien-lung HSU
    Journal of Zhejiang University(Science A:An International Applied Physics & Engineering Journal), 2009, 10 (02) : 290 - 300
  • [22] Digital signature with message recovery using self-certified public keys and its variants
    Tseng, YM
    Jan, JK
    Chien, HY
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 203 - 214
  • [23] Self-certified multi-proxy signature schemes with message recovery
    Wu, Tzong-sun
    Hsu, Chien-lung
    Lin, Han-yu
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, 2009, 10 (02): : 290 - 300
  • [24] Self-certified multi-proxy signature schemes with message recovery
    Tzong-sun Wu
    Chien-lung Hsu
    Han-yu Lin
    Journal of Zhejiang University-SCIENCE A, 2009, 10 : 290 - 300
  • [25] Self-certified digital signature scheme in manufacturing grid environment
    Xiao, Youan
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 528 - 531
  • [26] Privacy preserving self-certified signcryption scheme in trusted modules
    Zhang, Ming-Wu
    Yang, Bo
    Zhu, Sheng-Lin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (01): : 60 - 64
  • [27] Threshold signature scheme using self-certified public keys
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 89 - 97
  • [28] An identity (ID)-based and self-certified secret sharing scheme
    Pei Q.-Q.
    Ma J.-F.
    Pang L.-J.
    Zhang H.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 152 - 156
  • [29] Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 201 - 225
  • [30] Improvement of digital signature with message recovery using self-certified public keys and its variants
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (02) : 391 - 399