Efficient Proxy Signature Technology using Proxy-Register

위임등록을 통한 효율적인 대리 서명방식

  • Published : 2004.01.01

Abstract

Proxy signature is the signature that an original signer delegates his signing capability to a proxy signer and the proxy signer creates a signature on behalf of the original signer. The basic methodology of proxy signature is that the original signer creates a signature on delegation information and gives it secretly to the proxy signer, and the proxy signer uses it as a proxy private key or uses it to generate a proxy private key. In this paper, we suggest the proxy-register protocol that the original signer register to the verifier about the proxy related information, and verifier sets the warrant of proxy signer, validity period for proxy signature and some limitation.

대리서명은 원서명자가 자신의 서명 권한을 대리 서명자에게 위임하여 대리 서명자가 원서명자를 대신해서 서명을 생성하는 것을 말한다. 대리서명은 원서명자가 위임 정보에 대한 서명을 생성하고 이를 위임자에게 전달하여 위임자가 위임키로서 사용하게 하는 것이다. 본 논문에서는 원서명자와 대리서명자가 기존의 인증서를 발급 받은 환경에서 원서명자가 대리서명자에 대하여 검증자에계 위임정보를 등록하는 프로토콜을 제안한다. 위임내용에 대해 원서명자가 디지털 서명을 하고 검증자는 이에 해당하는 내용을 검증한 후 위임서명자에 대한 권한, 기간 등의 제약사항을 설정하고 허가된 범위 내에서 위임 서명을 한다.

Keywords

References

  1. B. Lee, H. Kim, K. Kim, 'Strong Proxy Signature and its Applications'' Proc. of SCIS 2001
  2. M.Mambo, K.Usuda, and E.Okamoto, 'Proxy signatures: Delegation of the power to sign messages', In IEICE Trans. Fundamentals, Vol.E79-A, No.9, Sep 1996
  3. M.Abe, T. Okamoto, 'Provably secure partially blind suignatures', In Advances in Cyyptologt Crypto'2000
  4. M. Bellare and S. Miner, 'A forward-Secure digital signature scheme,' Crypto'99, 1999
  5. L.Yi, G.Bai and G.Xiao, 'Proxy multisignature scheme: A new type of proxysignature scheme', Electronics Letters,Vol.36, No.6, 2000
  6. K.Shum and Victor K. Wei, 'A strongproxy signatures scheme with proxy signerprivacy protection', Proceedings of theEleventh IEEE International Workshopson Enabling Technologies: Infrastructurefor Collaborative Enterphses, 2002
  7. D.Chaum and H.van Antwerpen, 'Undeni-able signatures', Advances in Cryptology-CRYPTO'89 Proceedings, Springer-Verlag, 1990
  8. D.Pointcheval and J. Stern, 'Securityproofs for signatures', In Advances inCryptology: Eurocrypt'96, Springer, 1996
  9. V.Varadharajan, P. Allen, and S. Black,'An analysis of the proxy problem indistributed systems.' Proc. IEEEComputer Sociery Symp. on Research inSecurity and Privacy, 1991
  10. P.Horster, M.Michels, H.Petersen 'Hiddensignature schemes based on the discretelogarithm problem and related concepts',Proc. of Communications and MultimediaSecurity'95, Chapman&Hall, 1995
  11. M. Mambo, K. Usuda, and E. Okamoto,'Proxy signatures: Delegation of thepower to sign message,' IEICE Trans.Fundamentals, Vol. E79-A, No. 9, 1996
  12. D.Chaum, 'Blind signatures foruntraceable payments', Advances inCryptology: Crypto'82, Prenum Publishing Corporation, 1982
  13. M.Cerecedo, T.Matsumoto, and H.Imai 'Efficient and secure multiparty generation of digital signatures based on discretelogarithms,' IEICE Trans. Fundamentals,1993
  14. B.C, Neuman, 'Proxy-based authorizationand accounting for distributed systems,'Proc. 13th International Conference onDistributed Computing Systems, 1993
  15. O.Delos and J. J.Quisquater, 'AnIdentity-Based Signature Scheme withBounded Life-Span,' Springer-Verlag,Advances in Cryptology, Proceedings ofCRYPTO, 1994
  16. J.Cha and J. Cheon, 'An Identity-basedSignature from Gap Diffie-HellmanGroups,' Springer-Verlag, Advances inCryptology, Proceedings of PKC, 2003
  17. N.Lee, T.Hwang, and C.Wang, 'OnZhang's Nonrepudiable Proxy SignatureScheme', in Proceedings of ACISP'98-Australasian Conference on InformationSecurity and Privacy, Vol. 1438 of Lecture Notes in Computer Science, 1998