skip to main content
10.1145/1046290.1046299acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

Provably secure delegation-by-certification proxy signature schemes

Published:14 November 2004Publication History

ABSTRACT

In this paper, we first show that a previous proxy signature scheme by delegation with certificate is not provably secure under adaptive-chosen message attacks and adaptive-chosen warrant attacks. The scheme does not provide the strong undeniability. Then we construct a proxy signature scheme by delegation with certificate based on Co-GDH group from bilinear map. Our proxy signature scheme is existentially unforgeable against adaptive-chosen message attacks and adaptive-chosen warrant attacks in random oracle model. We adopt a straight method of security reduction in which our scheme's security is reduced to hardness of the computational co-Diffie-Hellem problem. The proposed signature scheme is the first secure delegation-by-certificate proxy signature based on co-GDH groups from bilinear maps under the formal security model in random oracle model.

References

  1. D. Boneh, B. Lynn and H. Shacham. Short Signatures from the Weil Pairiing. In Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2248, pp. 514--532, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Boldyreva, A. Palacio, B. Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights. At:http://eprint.iacr.org/2003/096.]]Google ScholarGoogle Scholar
  3. S. J. Hwang and C. C. Chen. A new proxy multi-signature scheme. In International workshop on cryptology and network security, Tamkang University, Taipei, Taiwan, Sep. 26-28, 2001.]]Google ScholarGoogle Scholar
  4. S. J. Hwang and C. H. Shi. A simple multi-proxy signature scheme. In Proceedings of the Tenth National Conference on Information Security, pp. 134--138, 2000.]]Google ScholarGoogle Scholar
  5. P. Kotzanikolaous, M. Burmester, and V. Chrisskopoulos. Secure transactions with mobile agent in hostile environments. In Proc. A CISP 2000, Lecture Notes in Computer Science 1841, Springer-Verlag, pp. 289--297, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Kim, J. Baek, B. Lee, and K. Kim. Secrets for mobile agent using one-time proxy signature. Cryptography and Information Security 2001, Vol 2/2, pp. 845--850, 2001.]]Google ScholarGoogle Scholar
  7. S. J. Kim, S. J. Park, D. H. Won. Proxy Signatures, revisited. ICICS'97, Lecture Notes in Computer Science 1334, pp. 223--232, Springer-Verlag.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W.D. Lin and J. K. Jan. A security personal learning tools using a proxy blind signature scheme. In Pro. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, pp. 273--277, 2000.]]Google ScholarGoogle Scholar
  9. B. Lee, H. Kim, and K. Kim. Strong proxy signgture and its applications. In Proceedings of SCIS, 2001, pp. 603--608.]]Google ScholarGoogle Scholar
  10. B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature. In Proc. ACISP 2001, pp. 474--486.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Mambo, K. Usuda and E. Okamoto. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp. 48--57.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H.-U. Park and L.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. ICICS 2001, Lecture Notes in Computer Science 2229, Springer- Verlag, pp. 451--455, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. M. Sun. An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8), 1999, pp. 717--722.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H.-M Sun and B.-T Hsieh. On the security of some proxy blind signature schemes. In AISW2004, Dunedin, New Zealand. Conferences in Research and Practice in Information Technology, Vol. 32.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. M. Sun, and B.-T. Hsieh. On the security of some proxy signature scheme. At:http://eprint.iacr.org/2003/068.]]Google ScholarGoogle Scholar
  16. H. Sun, N. -Y. Lee, and T. Hwang. Threshold proxy signatures. In IEEE Proceedings-Computes and Digital Technique, Vol. 146, IEEE Press, 1999, pp. 259--263.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. Z.-W. Tan, Z.-J. Liu. Proxy blind signature scheme based on DLP. Journal of Software, 2003/14, pp. 1931--1935, 2003.]]Google ScholarGoogle Scholar
  18. Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Security Analysis of Some Proxy Signatures. In Information Security and Cryptology - ICISC 2003, Springer- Verlag, 2004.]]Google ScholarGoogle Scholar
  19. Huaxion Wang and Josef Pieprzyk. Efficient One-time proxy signatures. In ASIACRYPT 2003, pp. 507--522, 2004, Springer- Verlag.]]Google ScholarGoogle Scholar
  20. K. Zhang. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, pp. 191--197, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Provably secure delegation-by-certification proxy signature schemes

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          InfoSecu '04: Proceedings of the 3rd international conference on Information security
          November 2004
          266 pages
          ISBN:1581139551
          DOI:10.1145/1046290

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 November 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader