A new proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem

被引:0
作者
机构
[1] Department of Mathematics, Faculty of Sciences, Hashemite University
来源
Tahat, N. (nedal@hu.edu.jo) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 08期
关键词
Digital signature; Elliptic curve discrete logarithm problem; Proxy signature;
D O I
10.1504/IJSN.2013.058113
中图分类号
学科分类号
摘要
The design of new elliptic curve cryptosystem is still an interest to community of cryptography. In this paper, a proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. Authorisation mechanism is introduced to prevent the online original signer in this scheme. The semi-trusted third party's secret value in the proxy signature makes the scheme more secure. The scheme needs shorter time to generate proxy signature since it is based on ECDLP. We show that our proxy signature scheme with a semi-trusted third party satisfies the unforgeability, undeniability and misuse properties. Compared with the Liu et al.'s scheme, our scheme has the advantages of high security strength and short key length. To the best of my knowledge, it is the shortest proxy signature scheme with a semi-trusted third party. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:207 / 211
页数:4
相关论文
共 17 条
[1]  
Awasthi A.K., Lal S., Proxy blind signature scheme, Transaction on Cryptology, 2, 1, pp. 5-11, (2005)
[2]  
Huang H., Chang C., A novel efficient (t,n) threshold proxy signature scheme, Information Sciences, 176, 10, pp. 1338-1349, (2006)
[3]  
Hwang S.J., Shi C.H., A simple multi-proxy signature scheme, Proceedings of the 10th National Conference on Information Security, pp. 134-138, (2000)
[4]  
Jiang-Pin N., Zhong J.Z., Forward-secure proxy signature scheme based on bilinear pairings, Computer Engineering, 35, 6, pp. 164-165, (2009)
[5]  
Jie Y., Hai-Feng Q., Li Z.-B., Strong forward security proxy signature scheme, Computer Engineering, 34, 17, pp. 162-164, (2008)
[6]  
Kim S., Park S., Won D., Proxy signatures, Proceedings of International Conference on Information and Communications Security (ICICS), pp. 223-232, (1997)
[7]  
Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation, 48, 177, pp. 203-209, (1987)
[8]  
Koblitz N., The state of elliptic curve cryptography, Design, Code Cryptography, 19, pp. 173-193, (1987)
[9]  
Lee B., Kim H., Kim K., Strong proxy signature and its applications, Proceedings of SCIS - Symposium on Cryptology and Information Security, 2, 2, pp. 603-608, (2001)
[10]  
Lee J., Cheon J., Kim S., An analysis of proxy signatures, Is A Secure Channel Necessary, Cryptology-CTRSA'03, pp. 68-79, (2003)