A new proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem

被引:0
|
作者
机构
[1] Tahat, Nedal
来源
Tahat, N. (nedal@hu.edu.jo) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 08期
关键词
Elliptic Curve Cryptosystem - Elliptic curve discrete logarithm problems - High securities - Original signers - Proxy signature scheme - Proxy signatures - Secret value - Semi-trusted third parties;
D O I
10.1504/IJSN.2013.058113
中图分类号
学科分类号
摘要
The design of new elliptic curve cryptosystem is still an interest to community of cryptography. In this paper, a proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. Authorisation mechanism is introduced to prevent the online original signer in this scheme. The semi-trusted third party's secret value in the proxy signature makes the scheme more secure. The scheme needs shorter time to generate proxy signature since it is based on ECDLP. We show that our proxy signature scheme with a semi-trusted third party satisfies the unforgeability, undeniability and misuse properties. Compared with the Liu et al.'s scheme, our scheme has the advantages of high security strength and short key length. To the best of my knowledge, it is the shortest proxy signature scheme with a semi-trusted third party. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [22] Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem
    Tzeng, SF
    Hwang, MS
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (02) : 61 - 71
  • [23] New approach to the solution of a discrete logarithm problem on an elliptic curve
    Bessalov, AV
    IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII RADIOELEKTRONIKA, 2002, 45 (7-8): : A36 - A40
  • [24] ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem
    Su, PC
    Chang, HKC
    Lu, EH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (03) : 757 - 772
  • [25] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [26] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    Journal of Electronics, 2006, (01) : 54 - 57
  • [27] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    Journal of Electronics(China), 2006, (01) : 54 - 57
  • [28] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [29] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xiangjun Xin
    Li Ding
    Qinglan Yang
    Chaoyang Li
    Tianyuan Zhang
    Yongxuan Sang
    Quantum Information Processing, 21
  • [30] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xin, Xiangjun
    Ding, Li
    Yang, Qinglan
    Li, Chaoyang
    Zhang, Tianyuan
    Sang, Yongxuan
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)