Eliptic curve based threshold proxy signature scheme with known signers

被引:0
|
作者
Institute of Mathematics, Warsaw University, Banacha 2, 02-097 Warszawa, Poland [1 ]
机构
来源
Fundam Inf | 2006年 / 4卷 / 411-425期
关键词
Cryptography - Problem solving;
D O I
暂无
中图分类号
学科分类号
摘要
In the article we present a new (t,n) threshold proxy signature scheme with known signers. It is based on the elliptic curve cryptosystem whose security refers to the discrete logarithm problem (DLP) in the group E(E_p) of rational points of elliptic curve over the finite field. In comparision to similar schemes based on the RSA or DSS systems our solution requires application of significantly shorter cryptographic keys. The scheme is relatively simple in construction, has the property of unforgeability, non-repudation and admits the proactive security.
引用
收藏
相关论文
共 50 条
  • [31] A proxy blind signature scheme based on elliptic curve with proxy revocation
    Wen-Yuan, Liu
    Feng, Tong
    Yong-An, Luo
    Feng, Zhang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
  • [32] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [33] Anonymous proxy signature scheme based on elliptic curve
    Zhu, Bao-Ping
    Chen, Shi-Yu
    Zhu, Jing
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
  • [34] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [35] Threshold ring signature scheme based on the curve
    Kuwakado, H
    Tanaka, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
  • [36] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [37] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [38] An elliptic curve proxy signature scheme
    Xiao, Youan
    Zhou, Zude
    Li, Layuan
    DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
  • [39] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [40] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):