Generalization of proxy signature-based on discrete logarithms
نویسندگان
چکیده
In the past few years, many excellent studies on proxy signature schemes have been published. Yet, traditional proxy signature schemes are mainly aimed at dealing with one or two separate proxy conditions each. In this article, the authors shall present a generalized version of the (t1/n1 – t2/n2) proxy signature scheme based on the discrete logarithms that can be applied to every proxy situation. The (t1/n1 – t2/n2) proxy signature scheme allows the original group of original signers to delegate their signing capability to a designated proxy group. The proxy group of proxy signers can cooperatively generate the proxy signature on behalf of the original group. Any verifier can verify the proxy signature on the message with the knowledge of the identities of the actual original signers and the actual proxy signers. Furthermore, some possible attacks have been considered, and our security analysis shows that none of them can successfully break the proposed scheme.
منابع مشابه
Improvement of efficient proxy signature schemes using self-certified public keys
Elaborating on the merits of self-certified public key systems and message recovery signature schemes, this paper proposed a proxy signature scheme based on discrete logarithms and its variant based on elliptic curve discrete logarithms. The proposed schemes are efficient in the terms of communication overheads and computational efforts due to the following reasons: (i) The signing message is u...
متن کاملAn Efficient Self Proxy Signature Scheme Based on Elliptic Curve Discrete Logarithm Problems
Self proxy signature is a type of proxy signature wherein, the original signer delegates the signing rights to himself, there by generating temporary public and private key pairs for himself. The aim of self proxy is to protect the signer's permanent secret key. Most of proposed self proxy signature scheme have been based on discrete logarithms which required for a protocol to generate and veri...
متن کاملA novel efficient (t, n) threshold proxy signature scheme
All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy si...
متن کاملSelf-certified multi-proxy signature schemes with message recovery
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 22 شماره
صفحات -
تاریخ انتشار 2003