A generalized proxy signature scheme based on the RSA cryptosystem

被引:0
|
作者
Xue, QS [1 ]
Cao, ZF
Qian, HF
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[2] Shangdong PE Inst, Dept Basic Theory, Jinan 250014, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Based on the RSA cryptosystem, a generalized proxy signature scheme is proposed. The proposed scheme can resist all of known possible attacks such as forgery attacks. In the random oracle model, the scheme can provide security properties of strong unforgeability, verifiability, strong undeniability, strong identifiability, distinguishability and prevention of misuse of proxy signing right.
引用
收藏
页码:662 / 665
页数:4
相关论文
共 50 条
  • [1] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [2] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [3] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [4] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [5] Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1309 - 1311
  • [6] Efficient Group Signature Scheme Based on RSA Cryptosystem
    Chen Yan-Hua
    Ye Cheng-Qing
    Zhang Peng
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 356 - +
  • [7] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [8] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [9] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [10] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    [J]. Journal of Electronics., 2006, (01) - 57