Proxy signature schemes based on factoring

被引:57
作者
Shao, Z [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Dept Comp & Elect Engn, Zhejiang 310012, Peoples R China
关键词
cryptography; proxy signature; multisignature; factoring; discrete logarithm;
D O I
10.1016/S0020-0190(02)00367-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. However, most of existing proxy signature schemes are based on the discrete logarithm problem. In this paper, the author would like to propose two efficient proxy signature schemes based on the factoring problem, which combine the RSA signature scheme and the Guillou-Quisquater signature scheme. One is a proxy-unprotected signature scheme that is more efficient. No matter how many proxy signers cooperatively sign a message, the computation load for verifiers would remain almost constant. The other is a proxy-protected signature scheme that is more secure. Finally, to protect the privacy of proxy signers, the author proposes a proxy-protected signature scheme with anonymous proxy signers. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:137 / 143
页数:7
相关论文
共 14 条
[1]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[2]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[3]  
GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
[4]  
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[5]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[6]  
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[7]  
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[9]   An efficient nonrepudiable threshold proxy signature scheme with known signers [J].
Sun, HM .
COMPUTER COMMUNICATIONS, 1999, 22 (08) :717-722
[10]   Threshold proxy signatures [J].
Sun, HM ;
Lee, NY ;
Hwang, T .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05) :259-263