期刊文献+

Self-certified multi-proxy signature schemes with message recovery 被引量:2

Self-certified multi-proxy signature schemes with message recovery
原文传递
导出
摘要 Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts. Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes, our proposed schemes have the following advantages: (1) They do not require the signing message to be transmitted, since the verifier can recover it from the signature; (2) The authentication of the public keys, verification of the signature, and recovery of the message can be simultaneously carried out in a single logical step; (3) No certificate is needed for validating the public keys. Further, the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space, e.g., smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems, the proposed schemes give better performance in terms of communication bandwidth and computation efforts.
出处 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期290-300,共11页 浙江大学学报(英文版)A辑(应用物理与工程)
基金 Project (No. 94-2213-E-182-019) supported by the National Science Council, Taiwan, China
关键词 Self-certified Multi-proxy signature Message recovery Smart cards Discrete logarithms Elliptic curve 自认证 多重代理签名方案 消息恢复签名方案 智能卡 离散对数
  • 相关文献

参考文献11

  • 1Neal Koblitz,Alfred Menezes,Scott Vanstone.The State of Elliptic Curve Cryptography[J].Designs Codes and Cryptography (-).2000(2-3)
  • 2ElGamal,T.A public key cryptosystem and a signature scheme based on discrete logarithms[].Lecture Notes in Computer Science.1985
  • 3Information Technology—Security Techniques—Entity Authentication Mechanism—Part 3: Entity Authentication Using a Public Key Algorithm. In-ternational Organization for Standardization. ISO/IEC 9798-3 . 1993
  • 4Kim, S,Park, S.,Won, D.Proxy Signatures, Revised[].Proc Int Conf on Information and Communications Security.1997
  • 5Stallings,W.Cryptography and Network Security: Principles and Practice[]..2002
  • 6Xue, Q,Cao, Z.A Nonrepudiable Multi-proxy Mul-tisignature Scheme[].Joint st Workshop on Mobile Futureand Symp on Trends in Communications.2004
  • 7.Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry(rDSA)[].ANSI X- September.91998
  • 8.Public Key Cryptography for the Financial Services Industry:The Elliptic Curve Digital Signature Algorithm(ECDSA)[].ANSI X.1998
  • 9Mambo,M,Usuda,K,Okamoto,E.Proxy Signatures for Delegating Signing Operation[].Proceedings of the Third ACM Conference on Computer and Communications Security.1996
  • 10Mambo M,Usuda K,Okamoto E.Proxy Signatures: Delegation of the Power to Sign Messages[].IEICE Transactions on Fundamementals of Electronics Communications and Computer Sciences.1996

同被引文献2

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部