Article

A new proxy signature scheme with revocation

Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County 413, Taiwan, ROC
Applied Mathematics and Computation (Impact Factor: 1.6). 02/2005; DOI: 10.1016/j.amc.2003.12.039
Source: DBLP

ABSTRACT In current proxy signature schemes, an original signer delegates her/his signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they are in general defective in proxy revocations. In this paper, we propose a proxy signature scheme which allows the original signer to revoke delegations whenever necessary.

Full-text

Available from: J.-L. Lu, Dec 31, 2013
0 Followers
 · 
161 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: SUMMARY Proxy signature allows an original signer to delegate her signing capability to a proxy signer. Recently, to provide lower communication cost and stronger security, Zhang and Yu proposed a short proxy signature scheme in the standard model. They claimed that their scheme simultaneously achieves several merits including strong unforgeability, shorter signature length, and lower computational cost. However, we show that Zhang and Yu's scheme is not as secure as they claimed, because anyone can obtain the actual signing key of proxy signer from three valid proxy signatures. Copyright © 2013 John Wiley & Sons, Ltd.
    International Journal of Communication Systems 11/2013; 28(4). DOI:10.1002/dac.2695 · 1.11 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a new type digital signature, proxy fail-stop signature scheme with proxy revocation. In the proposed scheme, the proxy signer can sign a message on behalf of the original signer and provide a proof of forgery if it occurs. Moreover, the original signer can revoke the signing rights from the proxy signer. The proposed scheme is based on two hard problems, discrete logarithm problem and factorization. We define the security requirements for the proxy fail-stop signature with revocation and show that our scheme satisfies all security requirements.
    06/2008; 11(3):281-295. DOI:10.1080/09720529.2008.10698184
  • [Show abstract] [Hide abstract]
    ABSTRACT: The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a formal security model and then propose a provable secure proxy multi-signature scheme based on ECC without pairings. Our proposed scheme can play a crucial role in application to distributed systems, grid computing, mobile agent environment etc.
    Information technology and control 07/2014; 43(No 2):198-203. DOI:10.5755/j01.itc.43.2.5377 · 0.81 Impact Factor