Abstract
We improve Malkin et al’s construction (Eurocrypt’04) of the proxy signature scheme in the random oracle model. Unlike Malkin et al’s scheme, the proposed scheme does not assume the existence of the trusted secure device, which has a global secret key that all users’ private keys can be recovered with. This makes the proposed scheme more scalable and efficient because users need not access and cooperate with the secure device to generate their public/private key pairs.
We show that the proposed scheme is provably secure based on the modified strong RSA assumption that was made by the Itkis et al (CRYPTO’01).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boldyreva, A., Palacio, A., Warinsch, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights. IACR ePrint Archive (2003), Available at: http://eprint.iacr.org/2003/096/
Bellare, M., Rogaway, P.: Random Oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conferences on Computer and Communication Security, November 1993, pp. 62–73 (1993)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)
Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)
Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital Distributed Security Architecture. In: Proceedings of National Computer Security Conference (1989)
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)
Goldreich, O., Pfitzmann, B., Rivest, R.L.: Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 153–168. Springer, Heidelberg (1998)
Guillou, L., Quisquater, J.: A paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)
Itkis, G., Reyzin, L.: Forward-Secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)
Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: EUROCRYPT 2004. LNCS, vol. 2332, pp. 306–332. Springer, Heidelberg (2002)
Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. IACR ePrint Archive (2004), available at: http://eprint.iacr.org/2004/052/
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(9), 1338–1354 (1996)
Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proceedings of 13th International Conference of Distributed Computing Systems, pp. 283–291 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, Y., Kim, H., Park, Y., Yoon, H. (2006). A New Proxy Signature Scheme Providing Self-delegation. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_27
Download citation
DOI: https://doi.org/10.1007/11927587_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49112-5
Online ISBN: 978-3-540-49114-9
eBook Packages: Computer ScienceComputer Science (R0)