An improvement of proxy multi-signature schemes based on elliptic curve cryptosystem in Internet environment

被引:0
作者
Chen, TS [1 ]
Chung, YF [1 ]
Liu, TP [1 ]
Hwang, GS [1 ]
机构
[1] Da Yeh Univ, Dept Comp Sci & Informat Engn, Changhua 505, Taiwan
来源
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II | 2002年
关键词
elliptic curve cryptosystem; proxy signature; integer factorization; discrete logarithm; cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The research in the paper is devoted to reducing the computational amount from the exponential operation into the multiplication one aimed at the improved schemes by Sun in verifying the proxy signature. Since the elliptic curve cryptosystem (ECC) can achieve the equal level of security constituted by RSA or DSA but under a lower computational overheads and key size, the original discrete-logarithm cryptosystem is transferred into the elliptic-curve cryptosystem to further promote the efficiency of the whole system.
引用
收藏
页码:505 / 510
页数:6
相关论文
共 14 条
[1]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[2]  
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[3]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[4]  
Koblitz N., 1994, A Course in Number Theory and Cryptography
[5]  
Lein Harn, 1999, Proceedings of 1999 International Workshop on Cryptographic Techniques and E-Commerce, P126
[6]  
LI Y, 2000, ELECTRON LETT, V36, P527
[7]  
LIN CH, 2001, P 11 NAT C INF SEC, P331
[8]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[9]  
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[10]  
Miller V. S., 1985, LNCS, V218, P417