Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.3.111

Proxy Signatures based on XTR Cryptosystem  

이재욱 (경북대학교 전자전기 공학부)
전동호 (경북대학교 전자전기 공학부)
최영근 (경북대학교 전자전기 공학부)
김순자 (경북대학교 전자전기 공학부)
Abstract
The XTR public key system has advantage of short key length and fast computing speed. So, the XTR is used usefully in complicated operation. In this paper, we propose a new algorithm of double exponentiation operation and a proxy signature protocol based on the XTR. The double exponentiation operation should be executed to apply XTR for the proxy signature protocol. But this algorithm is inappropriate, because two secret key has to be blown in existent operation algorithm. New algorithm enable double exponentiation operation with proxy signer's secret key and public information. And the XTR is used to generation and verification of proxy at proxy signature protocol. Therefore proxy signature based on the XTR has basic advantage of the XTR. These advantage can be used in internet as well as mobile.
Keywords
XTR; proxy signature;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Proxy signature : Delegation of the power to sign messages /
[ M.Mambo;K.Usuda;E.Okamoto ] / IEICE Trans. Fundamentals
2 Evidence that XTR is more secure than supersingular elliptic curve cryptosystems /
[ Eric R.Verheul ] / Advances in Cryptology-Eurocrypt
3 The XTR public key system /
[ Arjen K. Lenstra;Eric R.Verheul ] / Proceedings of Crypto, LNCS 1880
4 On Zhang's Nonrepudiable Proxy Signature Scheme /
[ N.Lee;T.Hwang;C.Wang ] / Proceedings of ACISP'98-Australasian Conference on Information Security and Privacy, Lecture Notes in Computer Science
5 Proxy signatures, revisited /
[ S.Kim;S.Park;D.Won ] / Proceedings of International Conference on Information and Communications Security
6 Speeding up XTR /
[ Martijn Stam;Arjen K.Lenstra ] / Proceedings of Asiacrypt
7 Doing more with fewer bits /
[ A.E.Brouwer;R.Pellikaan;E.R.Verheul ] / Proceedings Asiacrypt, LNCS 1716