Article

A new proxy signature scheme with revocation

Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County 413, Taiwan, ROC
Applied Mathematics and Computation (Impact Factor: 1.55). 02/2005; 61(3):799-806. DOI: 10.1016/j.amc.2003.12.039
Source: DBLP

ABSTRACT

In current proxy signature schemes, an original signer delegates her/his signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they are in general defective in proxy revocations. In this paper, we propose a proxy signature scheme which allows the original signer to revoke delegations whenever necessary.

Download full-text

Full-text

Available from: J.-L. Lu, Dec 31, 2013
    • "Yin et al. [41] pointed out that the scheme [7] still does not possess the properties of distinguishabil-ity, strong undeniability and presence of proxy misuse. Further they proposed a new PMS scheme with proxy revocation [23] [24] based on ECDLP. Accordingly, their scheme can resolve the proxy revocation and prevent proxy misuse due to use of a signature center. "
    [Show abstract] [Hide abstract]
    ABSTRACT: The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a formal security model and then propose a provable secure proxy multi-signature scheme based on ECC without pairings. Our proposed scheme can play a crucial role in application to distributed systems, grid computing, mobile agent environment etc.
    No preview · Article · Jul 2014 · Information technology and control
  • Source
    • "To resolve all problems stated above, Lu et al. [11] proposed a time-stamping proxy signature scheme with revocation. In their scheme, a trusted third party, called authentication server, is utilized. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a common problem. That is, a verifier cannot ascertain that a proxy signature was signed by the proxy signer during the valid delegation period. Additionally, these schemes do not support revocations. In this paper, we proposed a new time-stamping proxy signature scheme using time-stamping service to resolve the above problems. The security and performance of the proposed scheme are also analyzed.
    Full-text · Article · Jan 2006
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and they are considered very useful methods when one needs to delegate his signing power to other person in digital business. However, many proxy signature schemes have the defects that cannot solve proxy revocation problems. Moreover, they cannot provide the immediate revocation, even if a proxy signer colludes with any malicious attacker. In this paper, we propose a mediated proxy signature scheme with fast revocation. Our scheme solves the weaknesses of most proxy signature schemes and satisfies the security requirements for proxy signature scheme. And it also provides an effective proxy revocation whenever the original signer wants or signer’s key is compromised.
    Preview · Conference Paper · Aug 2005
Show more