Proxy signature distribution scheme over elliptic curve computation in a network
A proxy signature allows delegation of an owner’s signature to other parties to allow him/them to represent him/her. Given such delegation, traceability of the party representing the owner is important to maintain accountability over party actions. Also, the delegation process has to be sou...
محفوظ في:
المؤلف الرئيسي: | |
---|---|
مؤلفون آخرون: | |
التنسيق: | Final Year Project |
اللغة: | English |
منشور في: |
2013
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://hdl.handle.net/10356/53379 |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
المؤسسة: | Nanyang Technological University |
اللغة: | English |
الملخص: | A proxy signature allows delegation of an owner’s signature to other parties to allow
him/them to represent him/her. Given such delegation, traceability of the party
representing the owner is important to maintain accountability over party actions.
Also, the delegation process has to be sound and complete against forgery.
By using elliptical curve cryptosystems, a proxy signature can be providing optimal
security. Elliptical curve cryptosystems provide same level of security with a smaller
key size compared to conventional cryptosystems.
This report would summarize what have been done in this project including design
and implementation of proxy signature schemes over elliptical curve computation. |
---|