Design and implementation of proxy-protected proxy signature based on SM2
Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through th...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530247614300160 |
---|---|
author | Qing-xiao GUO Da-wei ZHANG Liang CHANG Xiao-dong LIU Jing-wen SONG |
author_facet | Qing-xiao GUO Da-wei ZHANG Liang CHANG Xiao-dong LIU Jing-wen SONG |
author_sort | Qing-xiao GUO |
collection | DOAJ |
description | Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance. |
format | Article |
id | doaj-art-d0906d395f3d4283a996a126d8e15a66 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-09-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-d0906d395f3d4283a996a126d8e15a662025-01-15T03:06:04ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-09-013475459551482Design and implementation of proxy-protected proxy signature based on SM2Qing-xiao GUODa-wei ZHANGLiang CHANGXiao-dong LIUJing-wen SONGBased on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192elliptic curveproxy signatureproxy-protected proxy signatureSM2 digital signature |
spellingShingle | Qing-xiao GUO Da-wei ZHANG Liang CHANG Xiao-dong LIU Jing-wen SONG Design and implementation of proxy-protected proxy signature based on SM2 网络与信息安全学报 elliptic curve proxy signature proxy-protected proxy signature SM2 digital signature |
title | Design and implementation of proxy-protected proxy signature based on SM2 |
title_full | Design and implementation of proxy-protected proxy signature based on SM2 |
title_fullStr | Design and implementation of proxy-protected proxy signature based on SM2 |
title_full_unstemmed | Design and implementation of proxy-protected proxy signature based on SM2 |
title_short | Design and implementation of proxy-protected proxy signature based on SM2 |
title_sort | design and implementation of proxy protected proxy signature based on sm2 |
topic | elliptic curve proxy signature proxy-protected proxy signature SM2 digital signature |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192 |
work_keys_str_mv | AT qingxiaoguo designandimplementationofproxyprotectedproxysignaturebasedonsm2 AT daweizhang designandimplementationofproxyprotectedproxysignaturebasedonsm2 AT liangchang designandimplementationofproxyprotectedproxysignaturebasedonsm2 AT xiaodongliu designandimplementationofproxyprotectedproxysignaturebasedonsm2 AT jingwensong designandimplementationofproxyprotectedproxysignaturebasedonsm2 |