Proxy Signature Schemes for Controlled Delegation

被引:0
|
作者
Sunitha, N. R. [1 ]
Amberker, B. B. [2 ]
机构
[1] Siddaganga Inst Technol, Dept Comp Sci & Engg, Tumkur, Karnataka, India
[2] Natl Inst Technol, Dept Comp Sci & Engg, Warangal, Andhra Pradesh, India
来源
关键词
Proxy Signature; Forward-Security; Proxy revocation; Threshold proxy signature scheme; Digital Signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature scheme allows one user to delegate his/her signing capability to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. After verification the verifier is convinced of the original signer's agreement on the signed message. We begin by proposing a simple proxy signature scheme which satisfies the basic requirements of a secure proxy signature scheme. We find that the scheme can be used to control delegation of financial power to a proxy signer. Using our scheme the proxy signer will be able to submit an e-cheque for only the amount he is entitled to by the original signer. Any cheating by the original signer or the proxy signer is identified by the verifier i.e. the bank. Any discrete log based signature scheme can be used to sign the messages. Here we use the Digital Signature Algorithm(DSA). Forward-Secure signatures enable the signer to guarantee the security of messages signed in the past even if his secret key is exposed today. We extended our work on proxy signatures by constructing two forward secure proxy signature schemes, one based on DSA and the other based on the popular Bellare-Miner Forward-secure scheme. Compared to existing schemes, the special feature of our schemes is that an original signer can delegate his signing capability to any number of proxy signers in varying time periods. Though the original signer gives proxy information to all the proxy signers at the beginning of the protocol, the proxy signers will be able to generate proxy signatures only in their allotted time periods. Moreover, our schemes meet the basic requirements of a proxy signature scheme along with proxy revocation. Both on-demand proxy revocation i.e. whenever the original signer wants to revoke the proxy signer and automatic proxy revocation i.e. immediate revocation after the expiry of the time period of the proxy signer, is provided. Additional properties of our scheme are as follows: identity of the proxy signer is available in the information sent by original signer to proxy signer, original signer need not send the information to proxy signer through a secure channel, warrant on the delegated messages can be specified, original signer cannot play the role of proxy signer, and verifier can determine when the proxy signature was generated. The Bellare-Miner Forward-secure proxy scheme can also be used as a Forward-secure threshold proxy signature scheme. We have considered Forgery by the original signer, Impersonating and framing attack to prove the security of our scheme.
引用
收藏
页码:159 / 174
页数:16
相关论文
共 50 条
  • [1] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [2] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Alexandra Boldyreva
    Adriana Palacio
    Bogdan Warinschi
    Journal of Cryptology, 2012, 25 : 57 - 115
  • [3] Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation
    Yen, Sung-Ming
    Wang, Jian-Hong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [4] Proxy signature schemes
    Lau, B. T.
    ICIEA 2006: 1ST IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-3, PROCEEDINGS, 2006, : 1462 - 1467
  • [5] Proxy signature schemes
    Lau, B. T.
    2006 1st IEEE Conference on Industrial Electronics and Applications, Vols 1-3, 2006, : 1196 - 1201
  • [6] Threshold proxy signature schemes
    Kan, Z
    INFORMATION SECURITY, 1998, 1396 : 282 - 290
  • [7] A Secure Proxy Signature Scheme with Delegation by Warrant
    Popescu, Constantin
    STUDIES IN INFORMATICS AND CONTROL, 2011, 20 (04): : 373 - 380
  • [8] Proxy Re-signature Supporting Conditional Delegation
    Wang, Xu An
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 844 - 848
  • [9] An efficient proxy signature scheme with full-delegation
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 513 - 518
  • [10] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063