Efficient self-certified proxy CAE scheme and its variants

被引:7
|
作者
Wu, Tzong-Sun [2 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
关键词
Self-certified; Proxy signature; Authenticated encryption; Convertible; AUTHENTICATED ENCRYPTION SCHEMES; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.jss.2008.12.040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an authenticated ciphertext on behalf of the original signer. To satisfy the requirement of confidentiality, only the designated recipient is capable of decrypting the ciphertext and verifying the proxy signature. A significant advantage of the proposed schemes is that the proxy signature conversion process takes no extra cost, i.e., when the case of a later dispute over repudiation occurs, the designated recipient can easily reveal the ordinary proxy signature for the public arbitration. If needed, the designated recipient can also convince anyone that he is the real recipient. In addition, integrating with self-certified public key systems, our schemes can earn more computational efficiency, since authenticating the public key and verifying the proxy signature can be simultaneously carried out within one-step. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:974 / 980
页数:7
相关论文
共 50 条
  • [1] Self-Certified Proxy Convertible Authenticated Encryption Scheme
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huan, Ting-Yu
    Yeh, Yi-Shiung
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 479 - +
  • [2] Self-certified threshold proxy signature scheme with message recovery
    School of Mathematical Science and Computing Technology, Central South University, Changsha 410075, China
    Jisuanji Gongcheng, 2006, 17 (216-218+221):
  • [3] Proxy signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1380 - 1389
  • [4] A threshold proxy signature scheme using self-certified public keys
    Xue, QS
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 715 - 724
  • [5] Efficient Self-Certified Blind Signature Scheme with Parings
    Zhang, Jian-hong
    Zhen, Wei-na
    2014 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN), 2014, : 198 - 203
  • [6] Efficient and Provably Secure Self-certified Signature Scheme
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    ACTIVE MEDIA TECHNOLOGY, PROCEEDINGS, 2009, 5820 : 501 - 512
  • [7] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [8] A New Self-Certified Proxy Multi-Signature Scheme with Message Recovery
    Zuo Weiping
    Liu Yunfang
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 330 - 332
  • [9] An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
    Tahat, Nedal
    Alomari, A. K.
    Al-Hazaimeh, Obaida M.
    Al-Jamal, Mohammad F.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (04): : 935 - 948
  • [10] Improvement of efficient proxy signature schemes using self-certified public keys
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 222 - 234