Proxy Management Protocol for based on Verifier for Efficient Proxy Signature

효율적인 위임서명을 위한 검증자 중심의 위임관리 프로토콜

  • 박세준 (숭실대학교 컴퓨터학과 멀티미디어 연구실) ;
  • 이용준 (숭실대학교 컴퓨터학과 멀티미디어 연구실) ;
  • 오동열 (숭실대학교 컴퓨터학과 멀티미디어 연구실) ;
  • 오해석 (경원대학교 소프트웨어대학)
  • Published : 2006.01.01

Abstract

Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signature schemes that used in these days have some problems about the security. Especially, it is difficult to prevent misuse of certification and private key. In this thesis, we propose the more stronger security structure by turning the point from original signer with proxy signer to original signer with verifier, and the proposed protocol is more stronger than previous scheme and can be applied to various PKI based application.

실생활에서 권한의 위임을 통한 위임서명 기법들이 최근 많이 연구되고 있다. 그러나 현재 사용되고 있는 위임 서명 기법은 많은 보안상의 문제점을 가지고 있다. 가장 큰 문제점은 인증서와 개인키의 오남용을 막기가 힘들다는 것이다. 본 논문에서는 기존의 원서명자와 위임서명자와의 관점을 원서명자와 검증자와의 관점으로 전환하여 구조적으로 보안이 강화된 위임관리 프로토콜을 제안한다. 제안하는 기법은 기존의 위임서명 기법보다 강력하며 현실적인 PKI 기반 구조를 준용하므로 다양한 응용 환경에 적용할 수 있다.

Keywords

References

  1. D.Chaum and H.Van Antwerpen, 'Undeniable signatures,' Proc. Cryptology-CRYPTO'89 Proceedings, Springer- Verlag, pp.458-464, 1990
  2. B.Lee, H.Kim and K.Kim, 'Self-certificate: PKI using self-certified key,' Proc. of Conference on Information Security and Cryptology, pp.1-9, 2000
  3. B.Lee, H.Kim and Y.Chang, 'Efficient proxy-protected proxy signature scheme based on discrete logarithm,' Proceedings of 10th Conference on Information Security, Hualien, Taiwan, ROC, pp.4-7, 2000
  4. L.Yi, G.Bai and G.Xiao, 'Proxy multi-signature scheme: A new type of proxy sig- nature scheme,' Electronics Letters, Vol.36, No.6, pp.527-528, 2000 https://doi.org/10.1049/el:20000422
  5. M.Abe and T.Okamoto, 'Provably secure partially blind signatures,' In. Advances in Cryptology Crypto'2000, pp.271-299, 2000
  6. M.Hwang, I.Lin and E.J.Lu, 'A secure nonrepudiable threshold proxy signature scheme with known signers,' International Journal of Informatica, vol.11 , no.2, pp.1-8, 2000
  7. S.M.Yen, C.P.Hung and Y.Y.Lee, 'Remarks on some proxy signature schemes,' Proceedings of the 2000 ICS: Workshop on Cryptology and Information Security, pp.54-59, 2000
  8. B.Lee, H.Kim and K.Kim, 'Strong proxy signature and its applications,' Proc. of SCIS 2001, International Conference on Information Security, pp.603-608, June. 2001
  9. D.R.Stinson and R.Strobl, 'A provably secure distributed Schnorr signatures and a(t,n) threshold scheme for implicit certificates,' Sixth Australasian Conference on Information Security and Privacy LNCS 2119, Springer-Verlag, pp.417-434, 2001
  10. G.Itkis and L.Reyzin, 'Forward-secure signatures with optimal signing and verifying,' Crypto'01, pp.68-72, 2001
  11. S.J.Hwang and C.C.Chen, 'A new proxy multi signature scheme,' International workshop on cryptology and network security, Tamkang University Taipei, Taiwan, pp.2628, 2001
  12. K.Shum and K.Wei, 'A strong proxy signatures scheme with proxy signer privacy protection,' Proceeding of Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.55-56, 2002
  13. J.Cha and J.Cheon, 'An identity-based signature from gap diffie-hellman groups,' Springer-Verlag, Advances in Cryptology, Proceedings of PKC '03, LNCS 2567, pp. 18-30, 2003
  14. J.Hwang, D.Lee and J.Lim, 'Digital signature scheme with restriction on signing capability,' Proc. of ACISP 2003, LNCS voI.2727, pp.324-335, 2003