An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography

被引:3
|
作者
Sun, Xue [1 ]
Xia, Mingping [1 ]
机构
[1] Beijing Union Univ, Beijing 100101, Peoples R China
关键词
Elliptic curve cryptography; Digital proxy signature; Discrete logarithm problem;
D O I
10.1109/ICCCS.2009.36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and weaknesses in existing schemes. The scheme uses enhanced one-way hash function based on elliptic curves discrete logarithm problem (ECDLP), which has a low computational cost and small key size. This paper discusses related security, working efficiency and reliability issues.
引用
收藏
页码:88 / 91
页数:4
相关论文
共 50 条
  • [21] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
    Li, Fengying
    Xue, Qingshui
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 101 - +
  • [22] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
    Li, Fengying
    Xue, Qingshui
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 423 - 426
  • [23] Efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography
    Ma, Rui
    Du, Linyue
    PLOS ONE, 2024, 19 (05):
  • [24] Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'
    He, Debiao
    Wu, Shuhua
    Chen, Jianhua
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1661 - 1664
  • [25] Blind Signature for Electronic Payment Based on Elliptic Curve Cryptography
    Xu, Shouzhi
    Li, Qiaoli
    Zhou, Huan
    Li, Chengxia
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 770 - 776
  • [26] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [27] A Fair Electronic Cash Scheme Based on Elliptic Curve Cryptography
    Xu, Shouzhi
    Liu, Qiaoli
    Yu, Hen
    Zhou, Huan
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 758 - 763
  • [28] New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography
    Su, Pin-Chang
    Tsai, Chien-Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5537 - 5555
  • [29] An improved proxy signature scheme
    Zhang, Xinghua
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 109 - 112
  • [30] A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography
    Sun, Hua
    Zheng, Xuefeng
    Yu, Yike
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 666 - 669