Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability

被引:8
作者
Hsu, CL
Wu, TS
机构
[1] Fo Guang Univ, Dept Informat, Ilan 262, Taiwan
[2] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
关键词
threshold proxy signature; self-certified; public key infrastructure; integrity; message recovery; traceability; nonrepudiation; elliptic curve;
D O I
10.1016/j.amc.2004.04.097
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we propose a new (t,n) threshold proxy signature scheme, in which at least t out of n proxy signers delegated by the original signer can sign messages on behalf of the original signer. The proposed scheme has the following main properties: (i) Message recovery that the signing message is unnecessary to be transmitted and can be recovered from the proxy signature; (ii) Nonrepudiation that the verifier can identify the proxy group which is responsible for a threshold proxy signature; (iii) Traceability that the verifier can identify the actual proxy signers from the proxy group; (iv) Self-certified public keys that the authenticity of public keys can be verified without requiring any certificate and combined with the tasks of verifying of the proxy signature and recovering of the signing message in a single logical step. In addition, we propose an elliptic Curve variant suitable for some cryptographic applications with limited computing power and storage space, e.g., smart card or Java card. As compared with the previous works based on the certificate-based public key system, the proposed schemes are more secure and efficient. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:201 / 225
页数:25
相关论文
共 36 条
[1]  
[Anonymous], 1998, 148883 ISOIEC
[2]  
[Anonymous], 1998, X931 ANSI
[3]  
[Anonymous], 97983 ISOIEC
[4]  
*ANSI, 1997, X963 ANSI
[5]  
*ANSI, 1997, X962 ANSI
[6]  
Blake I.F., 1999, LONDON MATH SOC LECT, V265
[7]   ElGamal-like digital signature and multisignature schemes using self-certified public keys [J].
Chang, YS ;
Wu, TC ;
Huang, SC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 50 (02) :99-105
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490