An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography

The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and weaknesses in existing schemes. The scheme uses enhanced one-way hash function based on elliptic curves discrete logarithm problem (ECDLP), which has a low computational cost and small key size. This paper discusses related security, working efficiency and reliability issues.

[1]  Min-Shiang Hwang,et al.  A threshold signature scheme for group communications without a shared distribution center , 2004, Future Gener. Comput. Syst..

[2]  Tomohiko Uyematsu,et al.  Efficient Secret Sharing Schemes Based on Authorized Subsets( Cryptography and Information Security) , 2005 .

[3]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[4]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[5]  廖宏梓,et al.  On the Elliptic Curve Digital Signature Algorithm , 2006 .

[6]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[7]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[8]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[11]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[12]  Nedal Tahat,et al.  A New Digital Signature Scheme Based on Factoring and Discrete Logarithms , 2008 .

[13]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[14]  Tung-Shou Chen,et al.  The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[15]  Tomohiko Uyematsu,et al.  Efficient Secret Sharing Schemes Based on Authorized Subsets , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[16]  Wei-Hua He,et al.  Digital signature scheme based on factoring and discrete logarithms , 2001 .