Skip to main content

Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations

  • Conference paper
Book cover Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 (HSI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3597))

Included in the following conference series:

Abstract

Because the Internet is vast and insecure, strong cryptographic protocols are required to support secure communication. In this paper, we propose an efficient way to perform secure delegations in a hierarchical group. We propose a practical multi-proxy signature scheme applicable to hierarchial organization using the Diffie-Hellman problem and secret sharing without secure channels. In addition, we improve the proposed scheme to a dynamic one allowing repeated delegations.

This work was supported by the Brain Korea 21 Project in 2004.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Desmedt, Y.: Threshold Cryptography. European Trans. on Telecommunications and Related Technologies 5(4), 35–43 (1994)

    MathSciNet  Google Scholar 

  2. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  3. Hwang, S., Shi, C.: A Simple Multi-proxy Signature Scheme. In: Proceeding of the Tenth National Conference on Information Security, Hualien, Taiwan, pp. 134–138 (2000)

    Google Scholar 

  4. Lal, S., Awasthi, A.: A New Multi-proxy Signature Scheme for Partial Delegation with Warrant, http://www.gfcr.org/ecryp/old/multi.pdf

  5. Lin, C., Wu, T., Hwang, J.: Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification. In: Proceeding of IWAP 2002 (2002)

    Google Scholar 

  6. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Message. IEICE Trans. on Fundamentals E79-A(9), 1338–1353 (1996)

    Google Scholar 

  7. Micali, S., Ohta, K., Reyzin, L.: Accountable-Subgroup Multisignatures. In: Proceeding of ACM Conference on Computer and Communications Security, pp. 245–254 (2001)

    Google Scholar 

  8. Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)

    Google Scholar 

  9. Xue, Q., Cao, Z.: Improved of Multi-proxy Signature Scheme. In: Proceeding of International Symposium on Communications and Information Technologies (ISCIT), pp. 450–455 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, SY., Lee, SH. (2005). Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_36

Download citation

  • DOI: https://doi.org/10.1007/11527725_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27830-6

  • Online ISBN: 978-3-540-31808-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics