Paper Title:
Further Study on System Optimization in Proxy Signature
  Abstract

In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete logarithm cryptosystem. In the scheme, the signature entrusting parameters are generated with private keys of original signer and the proxy signer; dishonest proxy signer and outer adversaries can not attack secret parameters or other proxy signature with feasible polynomial algorithm, thus the scheme provides effective protection for the secrecy of proxy signers and also renders reasonable supervision on the proxy right. By utilizing random algorithms in signature generating, the scheme avoids the relevance between different parameters and proxy signature from the same signer. Then we presented an improved proxy signature scheme based on ECC (Elliptic Curves Cryptosystem), the scheme well satisfies the requirement of proxy signature and also makes full use of the superiority of ECC, such as high efficiency and security. Therefore, the scheme proves to be applicable to integrated environment with limited system resources.

  Info
Periodical
Edited by
Qi Luo
Pages
518-524
DOI
10.4028/www.scientific.net/AMM.20-23.518
Citation
X. W. Zhou, "Further Study on System Optimization in Proxy Signature", Applied Mechanics and Materials, Vols. 20-23, pp. 518-524, 2010
Online since
January 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a...
505
Authors: Xuan Wu Zhou
Abstract:In the paper, we analyzed the system optimization algorithms in e-cash (electronic cash) by improving the efficiency of e-cash for software...
532
Authors: Xuan Wu Zhou
Abstract:As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography...
546
Authors: Xuan Wu Zhou
Abstract:Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and...
706
Authors: Xuan Wu Zhou, Yan Fu
Abstract:Discrete logarithm problem is an important trapdoor function to design asymmetric cryptosystem, and some fast public key cryptosystems have...
1318