Further Study on System Optimization in Proxy Signature

Abstract:

Article Preview

In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete logarithm cryptosystem. In the scheme, the signature entrusting parameters are generated with private keys of original signer and the proxy signer; dishonest proxy signer and outer adversaries can not attack secret parameters or other proxy signature with feasible polynomial algorithm, thus the scheme provides effective protection for the secrecy of proxy signers and also renders reasonable supervision on the proxy right. By utilizing random algorithms in signature generating, the scheme avoids the relevance between different parameters and proxy signature from the same signer. Then we presented an improved proxy signature scheme based on ECC (Elliptic Curves Cryptosystem), the scheme well satisfies the requirement of proxy signature and also makes full use of the superiority of ECC, such as high efficiency and security. Therefore, the scheme proves to be applicable to integrated environment with limited system resources.

Info:

Periodical:

Edited by:

Qi Luo

Pages:

518-524

DOI:

10.4028/www.scientific.net/AMM.20-23.518

Citation:

X. W. Zhou "Further Study on System Optimization in Proxy Signature", Applied Mechanics and Materials, Vols. 20-23, pp. 518-524, 2010

Online since:

January 2010

Authors:

Export:

Price:

$35.00

[1] De Castro LN, Von Zuben FJ. Learning and Optimization Using the Clone Selection Principle. IEEE Trans on Evolutionary Computation, 2002, 6(3): 239-251.

DOI: 10.1109/tevc.2002.1011539

[2] S. Abedi and R. Tafazolli, Genetically Modified Multiuser Detection for Code Division Multiple Access Systems, IEEE Journal on Selected Areas in Communications, vol. 20, no. 2, pp.463-473, (2002).

DOI: 10.1109/49.983373

[3] Haipeng Zhang, Mitsuo Gen. Effective Genetic Approach for Optimizing Advanced Planning and Scheduling in Flexible Manufacturing System. GECCO'06, July 8-12, 2006, Seattle, Washington, USA.

DOI: 10.1145/1143997.1144293

[4] Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).

DOI: 10.1109/tsp.2007.906774

[5] Xuanwu Zhou, Ping Wei. Proxy Authorization Signature with Conditional Anonymity and its Application[C]. Proceedings of International Symposium on Knowledge Acquisition and Modeling KAM'2008, IEEE Press. 2008, 799-803.

DOI: 10.1109/kam.2008.44

[6] ZhenJie Huang. Research on Digital Signature with Additional Properties . Xi'an: Xidian University, (2005).

[7] Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. Dynamic Group Signature with Forward Security and Its Application[C]. Proceeding of the Sixth International Conference on Grid and Cooperative Computing GCC'2007, IEEE Press. 2007, 473-480.

DOI: 10.1109/gcc.2007.63

[8] Hippe Zdzislaws, Maksy Milian Knap. Research on Pre-processing and Post-processing of Data in the Process of Creation Quasi-optimal Decision Trees. Intelligence Methods, 2002(11): 13-15.

[9] Chang Ting-Yi, Yang Chou-Chen, Hwang Min-Shiang. A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems, 2004, 20(6): 1013-1021.

DOI: 10.1016/j.future.2003.09.005

[10] M. Abe, M. Ohkubo and K. Suzuki. 1 out of n Signature from a Variety of Keys,. Advances in Cryptology-ASIACRYPT2002. Berlin, Heidelberg: Springer-Verlag, 2002, 415-423.

[11] Xuanwu Zhou, Ping Wei. Anonymous Proxy Authorization Signature Scheme with Forward Security [C]. Proceedings of International Conference on Computer Science and Software Engineering CSSE'2008, IEEE Press. 2008, (Vol. 3)872-875.

DOI: 10.1109/csse.2008.528

[12] Cramer R, Van Damgaard I, Maurer U. General secure multi-party computation from any linear secret-sharing scheme. Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, 2000: 316-334.

DOI: 10.1007/3-540-45539-6_22

[13] Blundo C, Desantis A. Perfectly Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-Crypto'92. New York: Springer-Verlag, 1993, 471-486.

DOI: 10.1007/3-540-48071-4_33

[14] Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.

DOI: 10.1007/11563952_24

[15] Camenish. J,J.M. Piveteau, Stadler.M. Efficient Group Signature Schemes for Large Groups". CRYPTO, 97, Berlin, Heidelberg: Springer-Verlag, 1997, 410~424.

[16] Xuanwu Zhou. Evolutionary Algorithm and its Application in Artificial Immune System [C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 32-36.

DOI: 10.1109/iita.2008.86

[17] Jianhong Zhang, Qianhong Wu and Yumin Wang. A Novel Efficient Group Signature Scheme with Forward Security,. Information and Communications Security. 2003, Vol. 2836: 292-300.

DOI: 10.1007/978-3-540-39927-8_27

[18] Boldyreva.A. Threshold Signature, Multi Signature and Blind Signature Schemes Based on the Gap-Diffe-Hellman-Group Signature Schemes,. PKC2003, Berlin, Heidelberg: Springer-Verlag, 2003, 25(2): 31-46.

DOI: 10.1007/3-540-36288-6_3

[19] M Abe, M Ohkubo and K Suzuki. 1 out of n Signature from a Variety of Keys [A]. Advances in Cryptology-ASIACRYPT2002[C]. Berlin, Heidelberg, New York: Springer-Verlag, 2002, 415~423.

[20] T Nakanishi, M Tao and Y Sugiyama. A Group Signature Scheme Committing the Group [A], ICICS2002[C], Berlin, Heidelberg, New York: Springer-Verlag, 2002, 73~84.

[21] Danyu Fang. Blind Digital Signature Schemes based on Design Elliptic Curves Public Key Cryptosystem [J]. Journal of ChongQing University of Posts and Telecommunications. 2006, 18(4): 1-3.

[22] Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. BSADF: Blind Signature Based on Anonymous Digital Fingerprint. Proceeding of the Fourth International Conference on Fuzzy System and Knowledge Discovery FSKD'2007, 2007. 8, IEEE Press . PP. 426-430.

DOI: 10.1109/fskd.2007.208

[23] Cabello Sergio, Padró Carles, Sáez Germán. Secret sharing Schemes with Detection of Cheaters for a General Access Structure [J]. Designs, Codes and Cryptography, 2002, 25(2): 175-188.

DOI: 10.1023/a:1013856431727

[24] Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.

DOI: 10.1007/11563952_24

[25] Guo Guo-Ping, Guo Guang-Can. Quantum secret sharing without entanglement [J]. Physics Letters A, 2003, 310(4): 247-251.

DOI: 10.1016/s0375-9601(03)00074-4

[26] D.W. Matolak, and B. Wang, Efficient Statistical Parallel Interference Cancellation for DS-CDMA in Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol. 6, no. 2, pp.566-574, February (2007).

DOI: 10.1109/twc.2007.05264

[27] Xuanwu Zhou. Threshold Cryptosystem Based Fair Off-line E-cash[C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 692-696.

DOI: 10.1109/iita.2008.87

[28] Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).

DOI: 10.1109/tsp.2007.906774

[29] S. Manohar, V. Tikiya, R. Annavajjala, and A. Chockalingam, BEROptimal Linear Parallel Interference Cancellation for Multicarrier DSCDMA in Rayleigh Fading, IEEE Transactions On Communications, vol. 55, no. 6, pp.1253-1265, June (2007).

DOI: 10.1109/tcomm.2007.898860

[30] Changji Wang, Dingyi Pei, Wenbao Jiang. An Improved E-cash System based on Restricted Blind Signature[J]. Journal of Electronics, 2002, 30(7): 1083-1085.

[31] L. Chen, T. Peterson. On the Efficiency of Group Signature Providing Information-Theoretic Anonymity". EUROCRYPT, 95, Berlin, Heidelberg: Springer-Verlag, 1995, 39~49.

In order to see related information, you need to Login.