Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Hi-index | 0.00 |
The design of new elliptic curve cryptosystem is still an interest to community of cryptography. In this paper, a proxy signature scheme with a semi-trusted third party based on Elliptic Curve Discrete Logarithm Problem ECDLP has been proposed. Authorisation mechanism is introduced to prevent the online original signer in this scheme. The semi-trusted third party's secret value in the proxy signature makes the scheme more secure. The scheme needs shorter time to generate proxy signature since it is based on ECDLP. We show that our proxy signature scheme with a semi-trusted third party satisfies the unforgeability, undeniability and misuse properties. Compared with the Liu et al. 's scheme, our scheme has the advantages of high security strength and short key length. To the best of my knowledge, it is the shortest proxy signature scheme with a semi-trusted third party.