Eliptic curve based threshold proxy signature scheme with known signers

被引:0
|
作者
Institute of Mathematics, Warsaw University, Banacha 2, 02-097 Warszawa, Poland [1 ]
机构
来源
Fundam Inf | 2006年 / 4卷 / 411-425期
关键词
Cryptography - Problem solving;
D O I
暂无
中图分类号
学科分类号
摘要
In the article we present a new (t,n) threshold proxy signature scheme with known signers. It is based on the elliptic curve cryptosystem whose security refers to the discrete logarithm problem (DLP) in the group E(E_p) of rational points of elliptic curve over the finite field. In comparision to similar schemes based on the RSA or DSS systems our solution requires application of significantly shorter cryptographic keys. The scheme is relatively simple in construction, has the property of unforgeability, non-repudation and admits the proactive security.
引用
收藏
相关论文
共 50 条
  • [21] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [22] Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 305 - 319
  • [23] Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers
    Hwang, SJ
    Chen, CC
    INFORMATICA, 2003, 14 (02) : 205 - 212
  • [24] Bilinear pairings-based threshold proxy signature schemes with known signers
    Xue, QS
    Cao, ZF
    Qian, HF
    DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 953 - 958
  • [25] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [26] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [27] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [28] A threshold RSA signature scheme with traceable signers
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
  • [29] A efficient (t,n) threshold proxy signature scheme based on elliptic curve cryptosystems
    Lu, Dianjun
    Zhang, Bingru
    Wang, Yun
    Li, Xinyan
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4586 - +
  • [30] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61