A new proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem

被引:0
|
作者
机构
[1] Tahat, Nedal
来源
Tahat, N. (nedal@hu.edu.jo) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 08期
关键词
Elliptic Curve Cryptosystem - Elliptic curve discrete logarithm problems - High securities - Original signers - Proxy signature scheme - Proxy signatures - Secret value - Semi-trusted third parties;
D O I
10.1504/IJSN.2013.058113
中图分类号
学科分类号
摘要
The design of new elliptic curve cryptosystem is still an interest to community of cryptography. In this paper, a proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. Authorisation mechanism is introduced to prevent the online original signer in this scheme. The semi-trusted third party's secret value in the proxy signature makes the scheme more secure. The scheme needs shorter time to generate proxy signature since it is based on ECDLP. We show that our proxy signature scheme with a semi-trusted third party satisfies the unforgeability, undeniability and misuse properties. Compared with the Liu et al.'s scheme, our scheme has the advantages of high security strength and short key length. To the best of my knowledge, it is the shortest proxy signature scheme with a semi-trusted third party. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [1] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    CEIS 2011, 2011, 15
  • [2] Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party
    Zhang, Ling
    Zhang, Jia-Hao
    Xin, Xiang-Jun
    Li, Chao-Yang
    Huang, Min
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (08)
  • [3] Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party
    Ling Zhang
    Jia-Hao Zhang
    Xiang-Jun Xin
    Chao-Yang Li
    Min Huang
    International Journal of Theoretical Physics, 62
  • [4] An Efficient Blind Signature Scheme Based on the Elliptic Curve Discrete Logarithm Problem
    Nikooghadam, Morteza
    Zakerolhosseini, Ali
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 125 - 131
  • [5] An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
    Tahat, Nedal
    Alomari, A. K.
    Al-Hazaimeh, Obaida M.
    Al-Jamal, Mohammad F.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04): : 935 - 948
  • [6] Certificateless proxy signature scheme based on discrete logarithm problem
    Xu, Chun-Gen
    Zhang, Ao-Hong
    Han, Mu
    Dou, Ben-Nian
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2010, 34 (06): : 733 - 737
  • [7] New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem
    Mala, Hamid
    Nezhadansari, Nafiseh
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 196 - 201
  • [8] A watermark protocol based on the semi-trusted third party
    Duan, F
    Zhou, YP
    Hu, Y
    ACTIVE MEDIA TECHNOLOGY, 2003, : 334 - 339
  • [9] Blind Signature Schemes Based on the Elliptic Curve Discrete Logarithm Problem
    Popescu, Constantin
    STUDIES IN INFORMATICS AND CONTROL, 2010, 19 (04): : 397 - 402
  • [10] FAIL-STOP DESIGNATED RECIPIENT SIGNATURE SCHEME BASED ON ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEM
    Tahat, Nedal
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2013, (31): : 205 - 218