A new proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem

被引:0
|
作者
机构
[1] Tahat, Nedal
来源
Tahat, N. (nedal@hu.edu.jo) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 08期
关键词
Elliptic Curve Cryptosystem - Elliptic curve discrete logarithm problems - High securities - Original signers - Proxy signature scheme - Proxy signatures - Secret value - Semi-trusted third parties;
D O I
10.1504/IJSN.2013.058113
中图分类号
学科分类号
摘要
The design of new elliptic curve cryptosystem is still an interest to community of cryptography. In this paper, a proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. Authorisation mechanism is introduced to prevent the online original signer in this scheme. The semi-trusted third party's secret value in the proxy signature makes the scheme more secure. The scheme needs shorter time to generate proxy signature since it is based on ECDLP. We show that our proxy signature scheme with a semi-trusted third party satisfies the unforgeability, undeniability and misuse properties. Compared with the Liu et al.'s scheme, our scheme has the advantages of high security strength and short key length. To the best of my knowledge, it is the shortest proxy signature scheme with a semi-trusted third party. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
相关论文
共 50 条
  • [41] New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs
    Weng, Jiang
    Dou, Yunqi
    Ma, Chuangui
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2017, 28 (02) : 99 - 108
  • [42] New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs
    Jiang Weng
    Yunqi Dou
    Chuangui Ma
    Applicable Algebra in Engineering, Communication and Computing, 2017, 28 : 99 - 108
  • [43] A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
    Wu Qingtao
    zhang Hongyi
    Pu Jiexin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (07): : 208 - 212
  • [44] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [45] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [46] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [47] Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem
    Tahat, Nedal
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2016, 54 (03) : 229 - 235
  • [48] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Awaneesh Kumar Yadav
    An Braeken
    Manoj Misra
    The Journal of Supercomputing, 2023, 79 : 11261 - 11299
  • [49] Two-party authenticated multiple-key agreement based on elliptic curve discrete logarithm problem
    Huang, Li-Chin
    Hwang, Min-Shiang
    International Journal of Smart Home, 2013, 7 (01): : 9 - 18
  • [50] A new multi-proxy multi-signature scheme based on elliptic curve cryptography
    Dang Minh Tuan
    Nguyen Anh Viet
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109