Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2008, Vol. 34 ›› Issue (24): 170-171.

• Security Technology • Previous Articles     Next Articles

Secure Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography

TIAN Zhi-gang1, BAO Wan-su1, ZHANG Wei2   

  1. (1. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004;2. Academy of Armored Forces Engineering of PLA, Beijing 100072)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-12-20 Published:2008-12-20

基于椭圆曲线密码的安全门限代理签名方案

田志刚1,鲍皖苏1,张 炜2   

  1. (1. 解放军信息工程大学电子技术学院,郑州 450004;2. 解放军装甲兵工程学院,北京 100072)

Abstract: Most threshold proxy signature schemes are constructed on the base of discrete logarithm in infinite fields. Discrete logarithm cryptography based on ElGamal has some drawbacks such as long keys and difficult key management, which seriously limit its practical application. Elliptic curve cryptography is introduced and a threshold proxy signature scheme based on the cryptography is proposed, which can satisfy the properties of the threshold proxy signature, and withstand the conspiracy attack.

Key words: proxy signature, threshold proxy signature, elliptic curve, conspiracy attack

摘要: 现有的门限代理签名方案大多基于有限域乘法群上的离散对数。基于ElGamal离散对数的密码机制存在密钥过长、密钥管理难等缺陷。该文针对上述缺陷,提出一个基于椭圆曲线密码机制的门限代理方案,满足了门限代理签名的性质,且能抵抗合谋攻击。

关键词: 代理签名, 门限代理签名, 椭圆曲线, 合谋攻击

CLC Number: