A proxy-protected signature scheme based on conic

  • Rongxing Lu*
  • , Zhenfu Cao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Recently, proxy signature, as a special digital signature, has received a significant attention and has been extensively researched in the cryptographic community. Many excellent proxy signature schemes have been proposed. In this paper, based on conic, we would like to propose a new proxy-protected signature scheme. The proposed scheme is derived from the Schnorr signature, and its security is based on the discrete logarithm problem over conic.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Information Security, InfoSecu '04
Pages22-26
Number of pages5
DOIs
StatePublished - 2004
Externally publishedYes
Event3rd International Conference on Information Security, InfoSecu '04 - Shanghai, China
Duration: 14 Nov 200416 Nov 2004

Publication series

NameACM International Conference Proceeding Series
Volume85

Conference

Conference3rd International Conference on Information Security, InfoSecu '04
Country/TerritoryChina
CityShanghai
Period14/11/0416/11/04

Keywords

  • Conic
  • Cryptography
  • Digital signature
  • Proxy signature

Fingerprint

Dive into the research topics of 'A proxy-protected signature scheme based on conic'. Together they form a unique fingerprint.

Cite this