Browse > Article

Proxy Management Protocol for based on Verifier for Efficient Proxy Signature  

Park Se-Joon (숭실대학교 컴퓨터학과 멀티미디어 연구실)
Lee Yong-Joon (숭실대학교 컴퓨터학과 멀티미디어 연구실)
Oh Dong-Yeol (숭실대학교 컴퓨터학과 멀티미디어 연구실)
Oh Hae-Seok (경원대학교 소프트웨어대학)
Abstract
Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signature schemes that used in these days have some problems about the security. Especially, it is difficult to prevent misuse of certification and private key. In this thesis, we propose the more stronger security structure by turning the point from original signer with proxy signer to original signer with verifier, and the proposed protocol is more stronger than previous scheme and can be applied to various PKI based application.
Keywords
proxy signature; proxy management protocol; verifier;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.Chaum and H.Van Antwerpen, 'Undeniable signatures,' Proc. Cryptology-CRYPTO'89 Proceedings, Springer- Verlag, pp.458-464, 1990
2 L.Yi, G.Bai and G.Xiao, 'Proxy multi-signature scheme: A new type of proxy sig- nature scheme,' Electronics Letters, Vol.36, No.6, pp.527-528, 2000   DOI   ScienceOn
3 S.J.Hwang and C.C.Chen, 'A new proxy multi signature scheme,' International workshop on cryptology and network security, Tamkang University Taipei, Taiwan, pp.2628, 2001
4 B.Lee, H.Kim and K.Kim, 'Strong proxy signature and its applications,' Proc. of SCIS 2001, International Conference on Information Security, pp.603-608, June. 2001
5 G.Itkis and L.Reyzin, 'Forward-secure signatures with optimal signing and verifying,' Crypto'01, pp.68-72, 2001
6 M.Hwang, I.Lin and E.J.Lu, 'A secure nonrepudiable threshold proxy signature scheme with known signers,' International Journal of Informatica, vol.11 , no.2, pp.1-8, 2000
7 J.Hwang, D.Lee and J.Lim, 'Digital signature scheme with restriction on signing capability,' Proc. of ACISP 2003, LNCS voI.2727, pp.324-335, 2003
8 B.Lee, H.Kim and K.Kim, 'Self-certificate: PKI using self-certified key,' Proc. of Conference on Information Security and Cryptology, pp.1-9, 2000
9 D.R.Stinson and R.Strobl, 'A provably secure distributed Schnorr signatures and a(t,n) threshold scheme for implicit certificates,' Sixth Australasian Conference on Information Security and Privacy LNCS 2119, Springer-Verlag, pp.417-434, 2001
10 M.Abe and T.Okamoto, 'Provably secure partially blind signatures,' In. Advances in Cryptology Crypto'2000, pp.271-299, 2000
11 K.Shum and K.Wei, 'A strong proxy signatures scheme with proxy signer privacy protection,' Proceeding of Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.55-56, 2002
12 S.M.Yen, C.P.Hung and Y.Y.Lee, 'Remarks on some proxy signature schemes,' Proceedings of the 2000 ICS: Workshop on Cryptology and Information Security, pp.54-59, 2000
13 B.Lee, H.Kim and Y.Chang, 'Efficient proxy-protected proxy signature scheme based on discrete logarithm,' Proceedings of 10th Conference on Information Security, Hualien, Taiwan, ROC, pp.4-7, 2000
14 J.Cha and J.Cheon, 'An identity-based signature from gap diffie-hellman groups,' Springer-Verlag, Advances in Cryptology, Proceedings of PKC '03, LNCS 2567, pp. 18-30, 2003