Skip to main content

A New Proxy Signature Scheme Providing Self-delegation

  • Conference paper
Information Security and Cryptology – ICISC 2006 (ICISC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4296))

Included in the following conference series:

Abstract

We improve Malkin et al’s construction (Eurocrypt’04) of the proxy signature scheme in the random oracle model. Unlike Malkin et al’s scheme, the proposed scheme does not assume the existence of the trusted secure device, which has a global secret key that all users’ private keys can be recovered with. This makes the proposed scheme more scalable and efficient because users need not access and cooperate with the secure device to generate their public/private key pairs.

We show that the proposed scheme is provably secure based on the modified strong RSA assumption that was made by the Itkis et al (CRYPTO’01).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boldyreva, A., Palacio, A., Warinsch, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights. IACR ePrint Archive (2003), Available at: http://eprint.iacr.org/2003/096/

  2. Bellare, M., Rogaway, P.: Random Oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conferences on Computer and Communication Security, November 1993, pp. 62–73 (1993)

    Google Scholar 

  3. Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital Distributed Security Architecture. In: Proceedings of National Computer Security Conference (1989)

    Google Scholar 

  6. Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  7. Goldreich, O., Pfitzmann, B., Rivest, R.L.: Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 153–168. Springer, Heidelberg (1998)

    Google Scholar 

  8. Guillou, L., Quisquater, J.: A paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)

    Google Scholar 

  9. Itkis, G., Reyzin, L.: Forward-Secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: EUROCRYPT 2004. LNCS, vol. 2332, pp. 306–332. Springer, Heidelberg (2002)

    Google Scholar 

  11. Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. IACR ePrint Archive (2004), available at: http://eprint.iacr.org/2004/052/

  12. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(9), 1338–1354 (1996)

    Google Scholar 

  13. Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proceedings of 13th International Conference of Distributed Computing Systems, pp. 283–291 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, Y., Kim, H., Park, Y., Yoon, H. (2006). A New Proxy Signature Scheme Providing Self-delegation. In: Rhee, M.S., Lee, B. (eds) Information Security and Cryptology – ICISC 2006. ICISC 2006. Lecture Notes in Computer Science, vol 4296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11927587_27

Download citation

  • DOI: https://doi.org/10.1007/11927587_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49112-5

  • Online ISBN: 978-3-540-49114-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics