Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using Bellare-Miner Scheme with Proxy Revocation

被引:1
|
作者
Sunitha, N. R. [1 ]
Amberker, B. B. [2 ]
机构
[1] Siddaganga Inst Technol, Dept Comp Sci & Engn, Tumkur, Karnataka, India
[2] Natl Inst Technol, Warangal, Andhra Pradesh, India
关键词
Proxy Signature; Forward-Security; Proxy revocation; Proxy key pair; Digital Signature;
D O I
10.1109/IAS.2008.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. After verification the verifier is convinced of the original signer's agreement on the signed message. Forward-Secure signatures enable the signer to guarantee the security of messages signed in the past even if his secret key is exposed today. We propose a forward secure proxy signature scheme based on the popular Bellare-Miner Forward-secure scheme. Compared to existing schemes, the special feature of our scheme is that an original signer can delegate his signing capability to any number of proxy signers in varying time periods. Though the original signer gives proxy information to all the proxy signers at the beginning of the protocol, the proxy signers will be able to generate proxy signatures only in their allotted time periods. Further, the proxy signatures are made forward-secure. Moreover, our scheme meets the basic requirements of a proxy signature scheme along with proxy revocation. Both on-demand proxy revocation i.e. whenever the original signer wants to revoke the proxy signer and automatic proxy revocation i.e. immediate revocation after the expiry of the time period of the proxy signer, is provided. Additional properties of our scheme are as follows: identity of the proxy signer is available in the information sent by original signer to proxy signer, original signer need not send the information to proxy signer through a secure channel, warrant on the delegated messages can be specified, original signer cannot play the role of proxy signer, and verifier can determine when the proxy signature was generated.
引用
收藏
页码:73 / +
页数:2
相关论文
共 50 条
  • [1] Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation
    Sunitha, N. R.
    Amberker, B. B.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 681 - +
  • [2] Forward-secure proxy signature and revocation scheme for a proxy signer with multiple original signers
    Amberker, B. B.
    Sunitha, N. R.
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 245 - 252
  • [3] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [4] A Strong Forward-Secure Proxy Blind Signature Scheme
    Zhang, Long
    Lu, Shuyi
    [J]. ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1391 - 1396
  • [5] An Improved Forward-Secure Multi-Proxy Signature Scheme
    Zhang, Jun
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 43 - 46
  • [6] Forward-secure proxy signature scheme for cellphone service providers
    Sunitha, N. R.
    Amberker, B. B.
    [J]. 2008 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2008, : 225 - +
  • [7] A proxy blind signature scheme with proxy revocation
    Park, Ji-Hye
    Kim, Young-Seol
    Chang, Jik Hyun
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 761 - +
  • [8] A NEW FORWARD-SECURE THRESHOLD PROXY RE-SIGNATURE SCHEME
    Yang, Xiaodong
    Wang, Caifen
    Zhang, Yulei
    Wei, Weiyi
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 566 - 569
  • [9] A proxy partially blind signature scheme with proxy revocation
    Yang, Fuw-Yi
    Liang, Ling-Ren
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (02) : 255 - 263
  • [10] A proxy partially blind signature scheme with proxy revocation
    Fuw-Yi Yang
    Ling-Ren Liang
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2013, 4 : 255 - 263