Browse > Article

Design of a Protocol to Delegate Signing Right for Multi-level Proxy Signature  

Kim Seong-yeol (울산과학대학 컴퓨터정보학부)
Abstract
Proxy signature schemes which allows original signer to delegate proxy signer to sign message on its behalf have a considerable amount of interest from researchers since Mambo[1] and have found many practical applications such as distributed network, Grid computing and electronic commerce. Araki[6] extended them to multi-level proxy signature. But it could not satisfy some security requirement. In this paper we propose a protocol to delegate signing right to another entity for multi-level proxy signature. Our protocol do not require secure channel and guarantee that nobody is able to repudiate delegation or acceptance of signing right, it is impossible for anyone to generate signature except designed and original signer can withdraw the delegation before expiration if it is necessary.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Mambo, K. Usuda, and E. Okamoto, 'Proxy signature : Delegation of the power to sign message', IEICE Transaction on Fundamentals, vol. E79-A, no. 9, pp. 1338-1354, 1996
2 L.Yi, G.Bai and G.Xiao,'Proxy multi signature scheme: A new type of proxy signature scheme,' Electronics Letters, vol.36 No.6,2000   DOI   ScienceOn
3 박소영, 이상호, '비밀분산법과 Diffie-Hellman 문제에 기반한 동적 멀티 대리서명 프로토콜', 한국정보과학회논문지(시스템 및 이론) 제31권 제8호, pp.465-472, 2004.8
4 남기회, 이여진, 김성열, 정일용, '위임인증서를 기반으로 한 대리서명 방식 프로토콜의 설계', 한국정보과학회 제30회 춘계학술발표회논문집, pp.431-433, 2003.4
5 S. Araki and K. Imamura, 'An application of Mambo - Usuda - Okamoto Proxy Signa ture Schemes', Proc. of ISITA, 2000
6 박세준, 오해석, 위임등록 프로토콜을 이용한 대리서명 기법', 정보처리학회논문지C 제11-C권 제1호, pp.1-10, 2004.2
7 S. Kim, S. Park and D. Won, 'Proxy signatures, revisited', Proe. of ICICS'97, LNCS 1334, pp. 223 - 232, 1997
8 M. Mambo, K. Usuda, and E. Okamoto, 'Proxy signature for delegating signing operation', Proc. Third ACM Conf. on Computer and Communications Security, pp. 48 - 57, 1996
9 T.EIGamal, 'A public key cry tosystem and signature scheme based on discrete logarit hms,' IEEE Tran. Information Theory, vol.31, No.4, 1985