Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2004.11C.1.001

Proxy Signature Scheme based on Proxy-Register Protocol  

Park, Se-Joon ((주)노스텍 R&D 센터)
Oh, Hae-Suk (경원대학교 IT)
Abstract
Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signatures are signature schemes that an original signer delegates his signing capability to a proxy signer, and the proxy signer creates a signature on behalf of the original signer. Proxy signatures are fundamentally accomplished by the process that original signer creates the signature about the proxy information and transmits to the proxy signer for using by the proxy key. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. At the same time, all security requirements that were mentioned in previous schemes are satisfied. We also show the advantages of our suggestion by comparing with the previous proxy signature schemes.
Keywords
Proxy-Register Protocol; Proxy Signature; Unforgeability; Verifiability; Identifiability; Undeniability; Prevention of Misuse;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Yi, G. Bai and G. Xiao, 'Proxy multi-signature scheme : A new type of proxy signature scheme,' Electronics Letters, Vol.36, No.6, 2000   DOI   ScienceOn
2 T. ElGamal, 'A public key cryptosystem and signature scheme based on discrete logarithms,' IEEE Tran. Information Theory, Vol.31, No.4, 1985   DOI
3 D. Chaum and H. van Antwerpen, 'Undeniable signatures,' Advances in Cryptology-CRYPTO '89 Proceedings, Springer -Verlag, 1990
4 K. Shum and Victor K. Wei, 'A strong proxy signatures scheme with proxy signer privacy protection,' Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprises, 2002   DOI
5 M. Mambo, K. Usuda and E. Okamoto, 'Proxy signatures tor delegating signing operation,' Proc. Third ACM Conf. on Computer and Communications Security, 1996   DOI
6 M. Mambo, K. Usuda, and E. Okamoto, 'Proxy signatures : Delegation of the power to sign message,' IEICE Trans. Fundamentals, Vol.E79-A, No.9, 1996
7 B. Lee, H. Kim, K. Kim, 'Strong Proxy Signature and its Applications,' Proc. of SCIS, 2001
8 C. Gamage, J. Leiwo and Y. Zheng, 'An efficient scheme for secure message transmission using proxy-signcryp-tion,' Technical Report 98-01, Peninsula School of Computing & Information Technology, Monash universirt, July, 1998
9 H. M. Sun, 'On proxy(multi) signature schemes,' Proceedings of the 2000 ICS : Workshop on Cryptology and Information Security, 2000
10 HB. Lee and K. Kim. 'Self-Certificate : PKI using Self-Certified Key,' Proc. of Conference on Information Security and Crtptology, 2000
11 S. J. Kim. S. J. Park and D. H. Won, 'Nominative signatures,' Proc. ICEIC'95, 1995
12 V. Varadharajan, P. Allen and S. Black, 'An analysis of the proxy problem in distributed systems,' Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991   DOI
13 K. Zhang, 'Threshold proxy signature schemes,' 1997 Information Security Workshop, 1997
14 Byungcheon LEE, Kwangjo Kim, 'Strong Proxy Signatures,' IEICE Trans. Fundamentals, No.1, 1999
15 A. Shamir, 'Identity-based cryptosystems and signature schemes,' Advances in Cryptology-Crypto 84, 1984
16 M. Hwang, I. Lin and E. J. Lu, 'A secure nonrepudiable threshold proxy signature scheme with known signers,' International Journal of Informatica, 2000
17 M.Abe, T. Okamoto, 'Provably secure partially blind signatures,' In Advances in Cyyptologt Crypto, 2000
18 H. Petersen and P. Horster, 'Self-certified keys Concepts and Applications,' In Proc. Communications and Multimedia Security '97, 1997
19 M. Bellare and S. Miner, 'A forward-Secure digital signature scheme,' Crypto '99, 1999
20 B. Lee, H. Kim and K. kim, 'Secure mobile agent using strong non-designated proxy signature,' Proc. of ACISP 2001, LNCS 2119, Springer-Verlag, 2001
21 D. Chaum, 'Blind signatures for untraceable payments,' Advances in Cryptology : Crypto '82, Prenum Publishing Corporation, 1982
22 P. Horster, M. Michels, H. Petersen, 'Hidden signature schemes based on the discrete logarithm problem and related concepts,' Proc. of Communications and Multimedia Security '95, Chapman & Hall, 1995