A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems

被引:0
作者
Lu, Dianjun [1 ]
Zhang, Bingru [1 ]
Wang, Yun [2 ]
Li, Xinyan [3 ]
机构
[1] Qinghai Normal Univ, Dept Math & Informat Sci, Xining, Peoples R China
[2] Qinghai Univ, Grown Up Edu Coll, Qinghai, Peoples R China
[3] Changjiang Normal Coll, Dept Math, Chongqing, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
digital signature; proxy signature; threshold proxy signature; elliptic curve cryptosystems;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of proposed threshold proxy signature schemes have been based on discrete logarithms which required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential operations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy signature schemes reveal that the receiver cannot find out who signed the proxy signatures. We propose an efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems (ECC for short). Compared with existing (t,n) threshold proxy signature schemes, our scheme can not only reduce the amount of computations and communications, but alse Integrate the short secret key characteristic of ECC. In our method, the original signer can know who generated the proxy signature, and the receiver can certify the actuality of the group signers who made the proxy signature.
引用
收藏
页码:4586 / +
页数:2
相关论文
共 19 条
[1]  
[Anonymous], INFORM SECURITY TECH
[2]   PKI, elliptic curve cryptography, and digital signatures [J].
Caelli, WJ ;
Dawson, EP ;
Rea, SA .
COMPUTERS & SECURITY, 1999, 18 (01) :47-66
[3]   Elliptic curves and logarithmic derivatives [J].
Coombes, KR .
JOURNAL OF PURE AND APPLIED ALGEBRA, 1999, 138 (01) :21-38
[4]   Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability [J].
Hsu, CL ;
Wu, TS .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) :201-225
[5]   Improvement of threshold proxy signature scheme [J].
Hsu, Chien-Lung ;
Wu, Tzong-Sun ;
Wu, Tzong-Chen .
Applied Mathematics and Computation (New York), 2003, 136 (2-3) :315-321
[6]   A novel efficient (t, n) threshold proxy signature scheme [J].
Huang, HF ;
Chang, CC .
INFORMATION SCIENCES, 2006, 176 (10) :1338-1349
[7]  
Hwang M S, 2000, INT J INFORMATICA, V11, P1
[8]  
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[9]  
LEE NY, 1998, LECT NOTES COMPUTER, V1438, P415
[10]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338