Further Study on System Optimization in Proxy Signature

Article Preview

Abstract:

In the paper, we analyzed optimization algorithms for proxy signature and presented an optimized proxy signature scheme based on discrete logarithm cryptosystem. In the scheme, the signature entrusting parameters are generated with private keys of original signer and the proxy signer; dishonest proxy signer and outer adversaries can not attack secret parameters or other proxy signature with feasible polynomial algorithm, thus the scheme provides effective protection for the secrecy of proxy signers and also renders reasonable supervision on the proxy right. By utilizing random algorithms in signature generating, the scheme avoids the relevance between different parameters and proxy signature from the same signer. Then we presented an improved proxy signature scheme based on ECC (Elliptic Curves Cryptosystem), the scheme well satisfies the requirement of proxy signature and also makes full use of the superiority of ECC, such as high efficiency and security. Therefore, the scheme proves to be applicable to integrated environment with limited system resources.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

518-524

Citation:

Online since:

January 2010

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] De Castro LN, Von Zuben FJ. Learning and Optimization Using the Clone Selection Principle. IEEE Trans on Evolutionary Computation, 2002, 6(3): 239-251.

DOI: 10.1109/tevc.2002.1011539

Google Scholar

[2] S. Abedi and R. Tafazolli, Genetically Modified Multiuser Detection for Code Division Multiple Access Systems, IEEE Journal on Selected Areas in Communications, vol. 20, no. 2, pp.463-473, (2002).

DOI: 10.1109/49.983373

Google Scholar

[3] Haipeng Zhang, Mitsuo Gen. Effective Genetic Approach for Optimizing Advanced Planning and Scheduling in Flexible Manufacturing System. GECCO'06, July 8-12, 2006, Seattle, Washington, USA.

Google Scholar

[4] Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).

DOI: 10.1109/tsp.2007.906774

Google Scholar

[5] Xuanwu Zhou, Ping Wei. Proxy Authorization Signature with Conditional Anonymity and its Application[C]. Proceedings of International Symposium on Knowledge Acquisition and Modeling KAM'2008, IEEE Press. 2008, 799-803.

DOI: 10.1109/kam.2008.44

Google Scholar

[6] ZhenJie Huang. Research on Digital Signature with Additional Properties . Xi'an: Xidian University, (2005).

Google Scholar

[7] Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. Dynamic Group Signature with Forward Security and Its Application[C]. Proceeding of the Sixth International Conference on Grid and Cooperative Computing GCC'2007, IEEE Press. 2007, 473-480.

DOI: 10.1109/gcc.2007.63

Google Scholar

[8] Hippe Zdzislaws, Maksy Milian Knap. Research on Pre-processing and Post-processing of Data in the Process of Creation Quasi-optimal Decision Trees. Intelligence Methods, 2002(11): 13-15.

Google Scholar

[9] Chang Ting-Yi, Yang Chou-Chen, Hwang Min-Shiang. A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems, 2004, 20(6): 1013-1021.

DOI: 10.1016/j.future.2003.09.005

Google Scholar

[10] M. Abe, M. Ohkubo and K. Suzuki. 1 out of n Signature from a Variety of Keys,. Advances in Cryptology-ASIACRYPT2002. Berlin, Heidelberg: Springer-Verlag, 2002, 415-423.

Google Scholar

[11] Xuanwu Zhou, Ping Wei. Anonymous Proxy Authorization Signature Scheme with Forward Security [C]. Proceedings of International Conference on Computer Science and Software Engineering CSSE'2008, IEEE Press. 2008, (Vol. 3)872-875.

DOI: 10.1109/csse.2008.528

Google Scholar

[12] Cramer R, Van Damgaard I, Maurer U. General secure multi-party computation from any linear secret-sharing scheme. Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, 2000: 316-334.

DOI: 10.1007/3-540-45539-6_22

Google Scholar

[13] Blundo C, Desantis A. Perfectly Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-Crypto'92. New York: Springer-Verlag, 1993, 471-486.

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[14] Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.

Google Scholar

[15] Camenish. J,J.M. Piveteau, Stadler.M. Efficient Group Signature Schemes for Large Groups". CRYPTO, 97, Berlin, Heidelberg: Springer-Verlag, 1997, 410~424.

Google Scholar

[16] Xuanwu Zhou. Evolutionary Algorithm and its Application in Artificial Immune System [C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 32-36.

DOI: 10.1109/iita.2008.86

Google Scholar

[17] Jianhong Zhang, Qianhong Wu and Yumin Wang. A Novel Efficient Group Signature Scheme with Forward Security,. Information and Communications Security. 2003, Vol. 2836: 292-300.

DOI: 10.1007/978-3-540-39927-8_27

Google Scholar

[18] Boldyreva.A. Threshold Signature, Multi Signature and Blind Signature Schemes Based on the Gap-Diffe-Hellman-Group Signature Schemes,. PKC2003, Berlin, Heidelberg: Springer-Verlag, 2003, 25(2): 31-46.

DOI: 10.1007/3-540-36288-6_3

Google Scholar

[19] M Abe, M Ohkubo and K Suzuki. 1 out of n Signature from a Variety of Keys [A]. Advances in Cryptology-ASIACRYPT2002[C]. Berlin, Heidelberg, New York: Springer-Verlag, 2002, 415~423.

Google Scholar

[20] T Nakanishi, M Tao and Y Sugiyama. A Group Signature Scheme Committing the Group [A], ICICS2002[C], Berlin, Heidelberg, New York: Springer-Verlag, 2002, 73~84.

DOI: 10.1007/3-540-36159-6_7

Google Scholar

[21] Danyu Fang. Blind Digital Signature Schemes based on Design Elliptic Curves Public Key Cryptosystem [J]. Journal of ChongQing University of Posts and Telecommunications. 2006, 18(4): 1-3.

Google Scholar

[22] Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. BSADF: Blind Signature Based on Anonymous Digital Fingerprint. Proceeding of the Fourth International Conference on Fuzzy System and Knowledge Discovery FSKD'2007, 2007. 8, IEEE Press . PP. 426-430.

DOI: 10.1109/fskd.2007.208

Google Scholar

[23] Cabello Sergio, Padró Carles, Sáez Germán. Secret sharing Schemes with Detection of Cheaters for a General Access Structure [J]. Designs, Codes and Cryptography, 2002, 25(2): 175-188.

DOI: 10.1023/a:1013856431727

Google Scholar

[24] Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.

Google Scholar

[25] Guo Guo-Ping, Guo Guang-Can. Quantum secret sharing without entanglement [J]. Physics Letters A, 2003, 310(4): 247-251.

DOI: 10.1016/s0375-9601(03)00074-4

Google Scholar

[26] D.W. Matolak, and B. Wang, Efficient Statistical Parallel Interference Cancellation for DS-CDMA in Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol. 6, no. 2, pp.566-574, February (2007).

DOI: 10.1109/twc.2007.05264

Google Scholar

[27] Xuanwu Zhou. Threshold Cryptosystem Based Fair Off-line E-cash[C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 692-696.

DOI: 10.1109/iita.2008.87

Google Scholar

[28] Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).

DOI: 10.1109/tsp.2007.906774

Google Scholar

[29] S. Manohar, V. Tikiya, R. Annavajjala, and A. Chockalingam, BEROptimal Linear Parallel Interference Cancellation for Multicarrier DSCDMA in Rayleigh Fading, IEEE Transactions On Communications, vol. 55, no. 6, pp.1253-1265, June (2007).

DOI: 10.1109/tcomm.2007.898860

Google Scholar

[30] Changji Wang, Dingyi Pei, Wenbao Jiang. An Improved E-cash System based on Restricted Blind Signature[J]. Journal of Electronics, 2002, 30(7): 1083-1085.

Google Scholar

[31] L. Chen, T. Peterson. On the Efficiency of Group Signature Providing Information-Theoretic Anonymity". EUROCRYPT, 95, Berlin, Heidelberg: Springer-Verlag, 1995, 39~49.

Google Scholar