Design and implementation of proxy-protected proxy signature based on SM2

Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through th...

Full description

Saved in:
Bibliographic Details
Main Authors: Qing-xiao GUO, Da-wei ZHANG, Liang CHANG, Xiao-dong LIU, Jing-wen SONG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530247614300160
author Qing-xiao GUO
Da-wei ZHANG
Liang CHANG
Xiao-dong LIU
Jing-wen SONG
author_facet Qing-xiao GUO
Da-wei ZHANG
Liang CHANG
Xiao-dong LIU
Jing-wen SONG
author_sort Qing-xiao GUO
collection DOAJ
description Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.
format Article
id doaj-art-d0906d395f3d4283a996a126d8e15a66
institution Kabale University
issn 2096-109X
language English
publishDate 2017-09-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-d0906d395f3d4283a996a126d8e15a662025-01-15T03:06:04ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-09-013475459551482Design and implementation of proxy-protected proxy signature based on SM2Qing-xiao GUODa-wei ZHANGLiang CHANGXiao-dong LIUJing-wen SONGBased on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192elliptic curveproxy signatureproxy-protected proxy signatureSM2 digital signature
spellingShingle Qing-xiao GUO
Da-wei ZHANG
Liang CHANG
Xiao-dong LIU
Jing-wen SONG
Design and implementation of proxy-protected proxy signature based on SM2
网络与信息安全学报
elliptic curve
proxy signature
proxy-protected proxy signature
SM2 digital signature
title Design and implementation of proxy-protected proxy signature based on SM2
title_full Design and implementation of proxy-protected proxy signature based on SM2
title_fullStr Design and implementation of proxy-protected proxy signature based on SM2
title_full_unstemmed Design and implementation of proxy-protected proxy signature based on SM2
title_short Design and implementation of proxy-protected proxy signature based on SM2
title_sort design and implementation of proxy protected proxy signature based on sm2
topic elliptic curve
proxy signature
proxy-protected proxy signature
SM2 digital signature
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00192
work_keys_str_mv AT qingxiaoguo designandimplementationofproxyprotectedproxysignaturebasedonsm2
AT daweizhang designandimplementationofproxyprotectedproxysignaturebasedonsm2
AT liangchang designandimplementationofproxyprotectedproxysignaturebasedonsm2
AT xiaodongliu designandimplementationofproxyprotectedproxysignaturebasedonsm2
AT jingwensong designandimplementationofproxyprotectedproxysignaturebasedonsm2