PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the article we present a new (t,n) threshold proxy signature scheme with known signers. It is based on the elliptic curve cryptosystem whose security refers to the discrete logarithm problem (DLP) in the group E(Fp) of rational points of elliptic curve over the finite field. In comparision to similar schemes based on the RSA or DSS systems our solution requires application of significantly shorter cryptographic keys. The scheme is relatively simple in construction, has the property of unforgeability, non-repudation and admits the proactive security.
Wydawca
Rocznik
Strony
411--425
Opis fizyczny
tab.,bibliogr. 20 poz.
Twórcy
autor
autor
Bibliografia
  • [BaKo 88] R. Balasubramanian, N. Koblitz, "The improbability that an elliptic curve has subexponential discrete log problem under Menezes-Okamoto-Vanstone algorithm," Cryptology 11 (1988), no. 2 (p.141-145).
  • [CGHN 97] Canetti, R. Gennaro, A. Herzberg and D. Naor, "Proactive Security: Long-term Protection Against Break-ins," CryptoBytes (1) 3 (Spring 1997).
  • [ChHu 03] Chin-Chen Chang and Hui-Feng Huang "An Efficient and Practical(t,n) Threshold Proxy Signature Scheme with Known Signers," Fundamenta Informatica 56 (2003), pp. 243-253.
  • [ChHw 03] Chiu-Chin Chen and Shin-Jia Hwang "Cryptoanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers," International Journal of Informatica (2003), vol 14, no. 2, pp. 205-212.
  • [Des 87] Y. Desmedt, "Society and group oriented cryptography: a new concept," Advances in Cryptology-Crypto'87, pages 120-127, 1987.
  • [DeFr 89] K. Desmedt, Y. Frankel, "Threshold cryptosystems," Advances in Cryptology-Crypto '89, pages 307-315, 1989.
  • [DeFr 91] K. Desmedt, Y. Frankel, "Shoved generation of authenticators and signatures," Advances in Cryptology-Crypto '91, pages 457-569, 1991.
  • [ElGa 85] T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Information Theory vol.IT-31, no.4, pages 469-472, 1985.
  • [HJJKY 97] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Public Key and Signature Systems," 1997 ACM Conference on Computers and Communication Security (1997).
  • [HLW 98] T. Hwang, N.Y. Lee, and C.H. Wang, "On Zhang's nonrepudiable proxy signature schemes," ACISP'98, LNCS 1438, pp. 415-422, (1998).
  • [HLL 00] Hwang, L-C Lin, E.J.-L. Lu, "A secure nonrepudiable threshold proxy signature scheme with known signers," International Journal of Informatica, 11(2) (2000), pp. 137-144.
  • [HLL 03] Hwang, L-C Lin, E.J. Lu, "A practical (t,n) threshold proxy signature scheme based on RSA cryptosystem," IEEE Trans. on Knowledge and Data Engineering 2003.
  • [KPW 97] S. Kim, S. Park, D. Won, "Proxy Signatures, Revisited," Lecture Notes in Computer Science, LCNCS 1334, pp.223-232, (1997).
  • [MUO 96] M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation," Proc. Third ACM Conf. on Computer and Communications Security, pp. 48-57, (1996).
  • [RSA 78] R. Rivest, A. Shamir, L. N. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM 21, pages 120-126, 1978.
  • [Sha 79] A. Shamir "How to share a secret," Communications of the ACM, 22 (1979), pp. 612-613
  • [Sch 91] C. P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol.4, no.3, pages 161-174, 1991.
  • [Sho 99] V. Shoup "Practical Threshold Signatures" IBM Research Report RZ 3121, April 19, 1999.
  • [Sun 99] H. M. Sun, "An efficient nonrepudiable threshold proxy signature scheme with known signers," Computer Communications, vol. 22, no. 8, pp. 717-722, (1999).
  • [Zha 97] K. Zhang, "Threshold proxy signature schemes," 1997 Information Security Workshop, pp. 94-101, (1997).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0009-0044
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.