• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 20 Issue 1
Feb.  2007
Turn off MathJax
Article Contents
YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12.
Citation: YUAN Ding, FAN Pingzhi. Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography[J]. Journal of Southwest Jiaotong University, 2007, 20(1): 8-12.

Nonrepudiable Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography

  • Received Date: 19 Jan 2006
  • Publish Date: 25 Feb 2007
  • An improved threshold proxy signature scheme was proposed to overcome the defects of the existing scheme that it can not resist conspiracy attacks and forgery attacks from the signers,and is not practical in some applications.In the signing process,every actual signer is required to put in his private key,which makes the signature contain secret information of both proxy signers and actual singers and resist conspiracy attacks and forgery attacks from the signers.An elliptic curve cryptography was used to replace ElGamal discrete logarithm cryptography in the original scheme,which makes the new scheme efficient.

     

  • loading
  • MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronic Communication and Computer Science,1996,E79-A(9):1 338-1 354.[2] MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C]//Proc.of the 3rd ACM Conference on Computer and Communications Security.New York:ACM,1996:48-57.[3] 李继国,李建中,曹珍富,等.具有已知代理人的不可否认门限代理签密方案[J].软件学报,2003,14(12):2 021-2 027.LI Jiguo,LI Jianzhong,CAO Zhenfu,et al.A nonrepudiable threshold proxy signcryption scheme with known proxy agent[J].Journal of Software,2003,14(12):2 021-2 027.[4] KIM S,PARK S,WON D.Proxy signatures,revisited[C]// ICICS'97,Lecture Notes in Computer Science.Berlin:Springer,1997,1 334:223-232.[5] ZHANG Kan.Threshold proxy signature schemes[C]//1997 Information Security Workshop.Ishikawa:Springer,1997:191-197.[6] SUN H M,LEE N Y,HWANG T.Threshold proxy signatures[J].IEE Proceeding-Computers and Digital Techniques,1999,146(5):259-263.[7] HSU C L,WU T S,WU T C.Improvement of threshold proxy signature scheme[J].Appl.Math.Comput.2003,136:315-321.[8] DENNING D.Cryptography and data security[M].Boston:Addison-Wesley,Reading,MA,1983.[9] E(l)GAMAL T.A public-key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory.1985,IT-31(4):469-472.[10] 王衍波.椭圆曲线上密码研究现状与展望[J].解放军理工大学学报,2002,3(6):18-25.WANG Yanbo.View of the cryptology on elliptic curves[J].Journal of PLA University of Science and Technology,2002,3(6):18-25.[11] MEHTA M,HARN L.Efficient one-time proxy signatures[J].IEE Proc.Commun.,2005,152(2):129-133.[12] 范恒英,何大可,卿铭.公钥密码新方向:椭圆曲线密码学[J].通信技术,2002,127(7):82-84.FAN Hengying,HE Dake,QING Ming.New direction of public key cryptography:elliptic curve cryptography[J].Communications Technology,2002,127(7):82-84.[13] TRAPPE W,WASHINGTON L C.Introduction to cryptography with coding theory[M].New Jersey:Prentice Hall,2002.[14] 秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4.QIN Zhiguang.Cryptography algorithm survey and trends[J].Computer Applications,2004,24(2):1-4.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1400) PDF downloads(380) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return