Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.4.13

Design of Proxy Registration Protocols for Stock Trading System  

이용준 (숭실대학교)
박세준 (숭실대학)
오해석 (경원대학교)
Abstract
Proxy signature scheme based on delegation of warrant is studied in these days. Proxy signature is a signature scheme that the original signer delegates his signing warrant to the proxy signer, and the proxy signer creates a signature on behalf of the original signer. For using this scheme, the security for Protecting from the forgeability or misuse is necessary. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. Finally, we will show the advantages of our suggestion by comparing with the previous proxy signature schemes.
Keywords
PKI; Proxy Signature; Delegation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Mambo, K. Usuda. and E. Okarnoto, 'Proxy signatures: Delegation of the power to sign messages', mICE Trans. Fundamentals, Vol.E79-4, No.9, pp. 1338-1353, Sep. 1996
2 B. Lee and K. Kim, 'Strong Proxy Signatures', mICE Trans. Fundamentals, Vol.E82, No.1. 1999
3 H. Petersen and P. Horster, 'Selfcertified keys-concepts and applications', Proc. of Communications and Multimedia Security'97. PP. 102-116, 1997
4 B. Lee. H. Kim. and K. Kim. 'Strong proxy signature and its applications'. Proc. of SCIS2001. PP. 603-608. 2001
5 이대기, 김희선, 조영섭, 진승헌, 정교일, 조현숙, '국내.외 전자서명 및 인증제도 동향 분석'. 한국정보보호학회 정보보호학회지, 제11권 제4호, pp. 27-44, 2001
6 양덕기, '사이버 증권거래와 전자서명 인증서비스 체계'. 한국정보보호학회 정보보호학회지, 제9권 제3호, pp. 28-43, 1999
7 O. Delos and J. J.Quisquater, 'An Identity-Based Signature Scheme with Bounded Life-Span', Advances in Cryptology, Proceedings of CRYPTO, 1994
8 Housley et al. 'RFC2459. Internet X.509 Publick Key Infrastructure Certificate and CRL Profile'. IETF. 1999
9 S. Kim, S. Park, and D. Won, 'Proxy signatures. revisited'. Proc. of ICICS'97. International Conference of Information and Communications Security, LNCS 1334, Springer-Verlag. pp. 223-232, 1997