Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (9): 47-54.doi: 10.11959/j.issn.2096-109x.2017.00192

• Papers • Previous Articles     Next Articles

Design and implementation of proxy-protected proxy signature based on SM2

Qing-xiao GUO1,Da-wei ZHANG1(),Liang CHANG2,Xiao-dong LIU3,Jing-wen SONG1   

  1. 1 School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China
    2 Guangxi Key Laboratory of Trusted Software,Guilin University of Electronic Technology,Guilin 541004,China
    3 Institute of Network Information Security,Shandong University,Jinan 250000,China
  • Revised:2017-08-27 Online:2017-09-01 Published:2017-10-18
  • Supported by:
    The National Natural Foundation of China(6167209);Key Laboratory of Trusted Software(KX201531)

Abstract:

Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.

Key words: elliptic curve, proxy signature, proxy-protected proxy signature, SM2 digital signature

CLC Number: 

No Suggested Reading articles found!