ABSTRACT
In this paper, we first show that a previous proxy signature scheme by delegation with certificate is not provably secure under adaptive-chosen message attacks and adaptive-chosen warrant attacks. The scheme does not provide the strong undeniability. Then we construct a proxy signature scheme by delegation with certificate based on Co-GDH group from bilinear map. Our proxy signature scheme is existentially unforgeable against adaptive-chosen message attacks and adaptive-chosen warrant attacks in random oracle model. We adopt a straight method of security reduction in which our scheme's security is reduced to hardness of the computational co-Diffie-Hellem problem. The proposed signature scheme is the first secure delegation-by-certificate proxy signature based on co-GDH groups from bilinear maps under the formal security model in random oracle model.
- D. Boneh, B. Lynn and H. Shacham. Short Signatures from the Weil Pairiing. In Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2248, pp. 514--532, 2001.]] Google ScholarDigital Library
- A. Boldyreva, A. Palacio, B. Warinschi. Secure Proxy Signature Schemes for Delegation of Signing Rights. At:http://eprint.iacr.org/2003/096.]]Google Scholar
- S. J. Hwang and C. C. Chen. A new proxy multi-signature scheme. In International workshop on cryptology and network security, Tamkang University, Taipei, Taiwan, Sep. 26-28, 2001.]]Google Scholar
- S. J. Hwang and C. H. Shi. A simple multi-proxy signature scheme. In Proceedings of the Tenth National Conference on Information Security, pp. 134--138, 2000.]]Google Scholar
- P. Kotzanikolaous, M. Burmester, and V. Chrisskopoulos. Secure transactions with mobile agent in hostile environments. In Proc. A CISP 2000, Lecture Notes in Computer Science 1841, Springer-Verlag, pp. 289--297, 2000.]] Google ScholarDigital Library
- H. Kim, J. Baek, B. Lee, and K. Kim. Secrets for mobile agent using one-time proxy signature. Cryptography and Information Security 2001, Vol 2/2, pp. 845--850, 2001.]]Google Scholar
- S. J. Kim, S. J. Park, D. H. Won. Proxy Signatures, revisited. ICICS'97, Lecture Notes in Computer Science 1334, pp. 223--232, Springer-Verlag.]] Google ScholarDigital Library
- W.D. Lin and J. K. Jan. A security personal learning tools using a proxy blind signature scheme. In Pro. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, pp. 273--277, 2000.]]Google Scholar
- B. Lee, H. Kim, and K. Kim. Strong proxy signgture and its applications. In Proceedings of SCIS, 2001, pp. 603--608.]]Google Scholar
- B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature. In Proc. ACISP 2001, pp. 474--486.]] Google ScholarDigital Library
- M. Mambo, K. Usuda and E. Okamoto. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp. 48--57.]] Google ScholarDigital Library
- H.-U. Park and L.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. ICICS 2001, Lecture Notes in Computer Science 2229, Springer- Verlag, pp. 451--455, 2001.]] Google ScholarDigital Library
- H. M. Sun. An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8), 1999, pp. 717--722.]] Google ScholarDigital Library
- H.-M Sun and B.-T Hsieh. On the security of some proxy blind signature schemes. In AISW2004, Dunedin, New Zealand. Conferences in Research and Practice in Information Technology, Vol. 32.]] Google ScholarDigital Library
- H. M. Sun, and B.-T. Hsieh. On the security of some proxy signature scheme. At:http://eprint.iacr.org/2003/068.]]Google Scholar
- H. Sun, N. -Y. Lee, and T. Hwang. Threshold proxy signatures. In IEEE Proceedings-Computes and Digital Technique, Vol. 146, IEEE Press, 1999, pp. 259--263.]]Google ScholarCross Ref
- Z.-W. Tan, Z.-J. Liu. Proxy blind signature scheme based on DLP. Journal of Software, 2003/14, pp. 1931--1935, 2003.]]Google Scholar
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Security Analysis of Some Proxy Signatures. In Information Security and Cryptology - ICISC 2003, Springer- Verlag, 2004.]]Google Scholar
- Huaxion Wang and Josef Pieprzyk. Efficient One-time proxy signatures. In ASIACRYPT 2003, pp. 507--522, 2004, Springer- Verlag.]]Google Scholar
- K. Zhang. Threshold proxy signature schemes. In 1997 Information Security Workshop, Japan, pp. 191--197, 1997.]] Google ScholarDigital Library
- Provably secure delegation-by-certification proxy signature schemes
Recommendations
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme
INCOS '12: Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative SystemsBy integrating self-certified public-key systems and the designated verifier proxy signature with message recovery, Wu and Lin proposed the first self-certified proxy convertible authenticated encryption (SP-CAE) scheme and its variants based on ...
Proxy-protected signature secure against the undelegated proxy signature attack
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected ...
Security analysis and improvement of some proxy signature schemes
InfoSecu '04: Proceedings of the 3rd international conference on Information securityIn 1996, Mambo et al introduced the concept of proxy signature. Proxy signature can be applied to mobile agent, e-vote etc. Recently, Sun and Hsieh showed that Lee et al's strong proxy signature scheme and its application to multi-proxy signature scheme,...
Comments