ECC based proxy signature scheme with forward security

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Proxy signatures have fascinated many applications which entail delegating signing rights or power of decision making to parties. Applications demanding multilevel authority delegation can be implemented using forward secured proxy systems distinctly from traditional use of forward secrecy in terms of protecting the signed documents from leakage by key exposure attack. In pre-sent decade, focus shift from using traditional desktop environment to portable mobile devices as well secured IOT’s using digital signature or proxy signature. Elliptic curve cryptography (ECC) based proxy signature algorithms with forward secrecy is the effective alternative to the traditional digital signature scheme in constrained resources. In this paper, our exclusive focus is on forward secure proxy signature scheme using ECC which deals with proxy key pair generation and forward secure the proxy secret key.

Cite

CITATION STYLE

APA

Bannore, A., & Devane, S. (2018). ECC based proxy signature scheme with forward security. In Communications in Computer and Information Science (Vol. 808, pp. 126–138). Springer Verlag. https://doi.org/10.1007/978-981-10-7635-0_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free