Browse > Article

A Time-limited Forward-secure Proxy Signature Scheme  

김상희 (이화여자대학교 컴퓨터학과)
조태남 (이화여자대학교 컴퓨터학과)
이상호 (이화여자대학교 컴퓨터학과)
채기준 (이화여자대학교 컴퓨터학과)
박운주 (한국전자통신연구원)
나재훈 (한국전자통신연구원)
Abstract
Proxy signature scheme is a cryptographic protocol that an original signer delegates her signing capability to a proxy signer, and then the proxy signer is able to create signatures on behalf of the original signer. In general, there is time-limit for which the signing capability of the proxy signer is valid. One of methods to limit the valid delegation time is to make public delegation information contain the expiration date of the delegation. however, in this method we cannot prevent the proxy signer from signing after the valid delegation is expired because no one knows the exact time when the proxy signer signed a message. The validity of the past legal signatures cannot be preserved in case that the proxy singer´s key is compromised during the delegation period. In this paper, we propose a new scheme, time-limited forward-secure proxy signature protocol, which prevents the proxy singer from signing after the valid delegation is expired and which preserves the validity of the past legal signatures even if the signing key is compromised. The proposed scheme does not require the exact time-information by making an original signer control time-related parameters and satisfies the forward-security property in each update-period of the proxy signing key. The time-period is determined according to the application characteristics or security policies.
Keywords
proxy signature; forward-secure signature; delegation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Mambo. K. Usuda and E. Okamoto. 'Proxy Signatures: Delegation of the Power to Sign Message,' IEICE Trans. Fundamentals, Vol. E79 A, No. 9, 1996
2 S. Kim, S. Park and D. Won, 'Proxy Signatures, Revisited,' Proc. of ICICS 97, 1997   DOI   ScienceOn
3 B. Lee, H. Kim and K. Kim, 'Strong Proxy Signature and its Applications,' Proc, of SCIS 2001, 2001
4 H. M. Sun, 'Design of Time Stamped Proxy Sig nature with Traceable Receivers,' Proc. of IEE Computers and Digital Techniques, Vol. 147, No. 6, 2000   DOI   ScienceOn
5 M. Bellare and S. Miner, 'A Forward Secure Digital Signature Scheme,' Crypto'99, 1999
6 G. Itkis and L. Reyzin, 'Forward Secure Signatures with Optimal Signing and Verifying,' Crypto'01, 2001
7 G. Itkis and L. Reyzin, 'SiBIR: Signer Base Intrusion-Resilient Signatures,' Crypto'02, 2002
8 H. Krawczyk, 'Simple Forward Secure Signatures from any Signature Scheme,' 7th ACM Conference on Computer and Communication Security, 2000   DOI
9 T. Malkin, D. Micciancio, and S. Miner, 'Efficient Generic Forward -Secure Signatures with an Unbo unded Number of Time Periods,' Eurocrypt'02, 2002
10 Y. Dodis, J. Katz, S. Xu and M. Yung, 'Key Insulated Public Key Cryptosystems,' Eurocrypt'02, 2002
11 C. P. Schnorr, 'Efficient Signature Generation by Smart Cards,' Journal of Cryptology, Vol. 4, 1991   DOI
12 A. J. Menezes, P. C. Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC, 1997
13 S. Haber and W. Stornetta, 'How to Time Stamp a Digital Document,' Proc, of Crypto'90, Vol. 537, 1990   DOI
14 A. Buldas, P. Laud, H. Lipmaa and J. Villemson, 'Time Stamping with Binary Linking Schemes,' Proc. of Crypto'98, 1998
15 A. Fiat and A. Shamir, 'How to Prove Yourself: Practical Solutions to Identification and Signature Problems,' Proc. of Crypto'86, Vol. 263, 1986