DocumentCode :
3106530
Title :
Study on Proxy Signature Schemes with Bionic Optimization
Author :
Zhou, Xuanwu ; Wei, Ping ; Yang, Xiaoyuan ; Zhang, Ping
Author_Institution :
Key Lab. of Network & Inf. Security, Chinese Armed Police Force, Xi´´an, China
fYear :
2009
fDate :
13-14 Dec. 2009
Firstpage :
365
Lastpage :
368
Abstract :
Bionic evolution is an adaptive artificial intelligence technique; it mimics natural evolution process to solve optimization problems. In the paper, we present an improved proxy signature scheme based on bionic evolution. In the scheme, the original private key is generated with bionic evolution algorithm by a successive optimizing process. The optimizing selection algorithm renders effective protection for the private key and the signature system, avoids the insecure randomness in secret parameter selection, and thus prevents generalized signature forgery and coalition attack of original signer and proxy signers. The algorithms of the scheme take great advantage of the superiority of ECC (Elliptic Curves Cryptosystem), such as high efficiency, short key length and etc. The scheme can achieve the same security with less storing space, smaller communication band-width and less overheads of the system and thus proves to be applicable to such circumstances as with restricted computation ability and integrated space, circumstances with limited bandwidth yet requiring for high-speed operation.
Keywords :
artificial intelligence; evolutionary computation; private key cryptography; random processes; adaptive artificial intelligence technique; bionic evolution algorithm; bionic optimization; coalition attack; communication bandwidth; computation ability; elliptic curves cryptosystem; generalized signature forgery; insecure randomness; natural evolution process; optimizing selection algorithm; original signer; private key; proxy signature schemes; proxy signers; secret parameter selection; signature system; Application software; Bandwidth; Conference management; Educational institutions; Elliptic curve cryptography; Elliptic curves; Information technology; Polynomials; Public key cryptography; Stability; bionic evolution; elliptic curves; private key optimization; proxy signature; system efficiency;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Future Information Technology and Management Engineering, 2009. FITME '09. Second International Conference on
Conference_Location :
Sanya
Print_ISBN :
978-1-4244-5339-9
Type :
conf
DOI :
10.1109/FITME.2009.97
Filename :
5381003
Link To Document :
بازگشت