Skip to main content
Log in

A nominative multi-proxy signature scheme based on ECC

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Message.IEICE Trans Fundam, 1996,E79-A(9): 1 338–1 354.

    Google Scholar 

  2. Kotzanikolaous P, Burmester M, Chrisskopoulos V. Secure Transactions with Mobile Agents in Hostile Environments.Proc ACISP, LNCS 1841. Berlin: Springer-Verlag, 2000, 289–297.

    Google Scholar 

  3. Park H V, Lee I Y. A Digital Nominative Proxy Signature Scheme for Mobile Communication.ICICS2001, LNCS 2229 Berlin: Springer-Verlag, 2001. 451–455.

    Google Scholar 

  4. Seo S H, Lee S H. New Nominative Proxy Signature Scheme for Mobile Communication.Proceeding of SPI, Brno, Czech Republic, April 2003, 148–154.http://www.home.ewha.ac.kr

  5. Kim S J, Park S J, Won D H. Nominative Signatures.Proc ICEIC'95, Yanbian, China, Aug 1995. 68–71.http://www.dosan.skku.ac.kr

  6. Koblitz N. Elliptic Curve Cryptosystem.Math Comp. 1987,48: 203–209.

    Article  MATH  MathSciNet  Google Scholar 

  7. Kim S J, Park S J, Won D H. Zero-Knowledge Nominative Signatures.Proc of Pragocrypt'96, International Conference on the Theory and Applications of Cryptology, Czech, Prague, Sept 1996. 380–392.http://www.kisa.or.kr Sept 1996.

  8. Lee W B, Cang C Y. Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm.http://www.citeseer.nj.nec.com, June 2000.

  9. Lin C H, Lee C L. Elliptic-Curve Undeniable Signature Schemes.http://www.ubilab.org/publications, May 2001.

  10. Gennaro R, Jarecki S, Krawczyk H,et al.. Robust Threshold DSS Signature.Advances in Cryptology-Eurocrypt'96, LNCS 1070. Berlin: Springer-Verlag, 1996, 354–371.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Foundation item: Supported by the National Natural Science Fundation of China (90104035)

Biography: MA Chuan-gui (1962-) male, Professor, Ph.D. research direction: information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chuan-gui, M., Feng-xiu, G. & Yan, W. A nominative multi-proxy signature scheme based on ECC. Wuhan Univ. J. Nat. Sci. 10, 223–226 (2005). https://doi.org/10.1007/BF02828655

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828655

Key words

CLC number

Navigation