An efficient proxy-protected signature scheme based on factoring

  • Yuan Zhou*
  • , Zhenfu Cao
  • , Zhenchuan Chai
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, most of previously proposed schemes in these literatures are based on discrete logarithm problems. To our best knowledge, there still doesn't exist an indeed proxy signature scheme based on factoring. The paper present a new proxy signature scheme based on factoring, along with a complete proof of security in the Random Oracle model. The proposed scheme does not need a secure channel to transmit proxy private key.

Original languageEnglish
Title of host publicationParallel and Distributed Processing and Applications - ISPA 2005 Workshops - ISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Proceedings
Pages332-341
Number of pages10
DOIs
StatePublished - 2005
Externally publishedYes
EventISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA - Nanjing, China
Duration: 2 Nov 20055 Nov 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3759 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA
Country/TerritoryChina
CityNanjing
Period2/11/055/11/05

Fingerprint

Dive into the research topics of 'An efficient proxy-protected signature scheme based on factoring'. Together they form a unique fingerprint.

Cite this