ABSTRACT
A proxy signature scheme permits a specific selected person, named a proxy signer, to sign messages on behalf of the original signer. It is a useful mechanism in several fields. For example, a director of a company can delegate his signing power to a proxy agent when he goes to travel.
In 2002, Shum and Wei proposed a proxy signature scheme [19] which it was elaborated to protect the proxy signer's identity using an alias. However, the insecurity of the protocol was remarked by Sun and Hsieh [24].
To avoid the mentioned weakness, in this work we suggest an amelioration of Shum and Wei proxy signature using RSA encryption [16], and we present a numerical simulation to evaluate its efficiency. Also, we study its security and complexity.
- S. Ezziri and O. Khadir, A blind signature based on the DLP and RSA cryptosystem, Gulf Journal of Mathematics, Vol 6, Issue 4, pp. 44--50, 2018.Google ScholarCross Ref
- H. Ghodosi and J. Pieprzyk. Repudiation of cheating and non-repudiation of Zhang's proxy signature schemes. In: Proceedings of Australasian Conference on Information Security and Privacy (ACISP'99), LNCS 1587, Springer-Verlag, pp. 129--134, 1999. Google ScholarDigital Library
- M. Hwang, I. Lin and E.J. Lu. A secure nonrepudiable threshold proxy signature scheme with known signers. Informatica, Vol. 11, No.2, pp. 1--8, 2000.Google Scholar
- S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," Proc. of ICICS'97, International Conference on Information and Communications Security, LNCS 1334, Springer-Verlag, pp. 223--232, 1997. Google ScholarDigital Library
- P. Kotzanikolaous, M. Burmcster, and V. Chrisskopoulos, "Secure Transactions with Mobile Agents in Hostile Environments", Proc. ACISP, LNCS 1841 (2000) 289--297, 2000. Google ScholarDigital Library
- J. Lee, J. Cheon and S. Kim. An analysis of proxy signatures: Is a secure channel necessary? In: Proceedings of CT-RSA Conference, LNCS 2612, Springer-Verlag, pp. 68--79, 2003. Google ScholarDigital Library
- N. Y. Lee, T. Hwang and C. H. Wang. On Zhang's nonrepudiable proxy signature schemes. In: Proceedings of Australasian Conference on Information Security and Privacy (ACISP'98), LNCS 1438, Springer-Verlag, pp. 415--422, 1998. Google ScholarDigital Library
- B. Lee and K. Kim. Strong proxy signatures. IEICE Transactions Fundamentals, Vol.E- 82, No.1, pp. 1--11, 1999.Google Scholar
- B. Lee, H. Kim and K. Kim, Secure mobile agent using strong non-designated proxy signature, Proc. of ACISP 2001, LNCS 2119, Springer-Verlag, pp. 474--486, 2001. Google ScholarDigital Library
- B. Lee, H. Kim, and K. Kim, Strong Proxy Signature and its Applications, Proc of SCIS, pp. 603--608, 2001.Google Scholar
- M. Mambo, K. Usuda, and E. Okamoto, Proxy Signature: Delegation of the Power to Sign Messages, IEICE Trans. Fundamentals, E79-A:9, pp. 1338--1353, 1996.Google Scholar
- Menezes, A. J., van Oorschot, P. C., Vanstone, S. A. Handbook of applied cryptography,1996. Google ScholarDigital Library
- T. Okamoto, M. Tada and E. Okamoto, Extended proxy signaures for smart card, In: Proceedings of Information Security Workshop'99, LNCS 1729, Springer-Verlag, pp. 247--258, 1999. Google ScholarDigital Library
- H. U. Park and I. Y. Lee. A digital nominative proxy signature scheme for mobile communications. In: Proceedings of Information and Communications Security (ICICS'01), LNCS 2229, Springer-Verlag, pp. 451--455, 2001. Google ScholarDigital Library
- H. Petersen and P. Horster. Self-certified keys-concepts and applications. In: Proceedings of Conference on Communivations and Multimedia Security, 1997.Google ScholarCross Ref
- R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, Vol. 21, pp. 120--126, 1978. Google ScholarDigital Library
- A. Romao and M. M. da Silva. Secure mobile agent digital signatures with proxy certificates. In: Proceedings of E-Commerce Agents, LNAI 2033, pp. 206--220, 2001. Google ScholarDigital Library
- Shin-Yan Chiou, Tsung-Ju Wang, and Jiun-Ming Chen, Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature, Security and Communication Networks, vol. 2017, Article ID 3075210, 16 pages, 2017.Google Scholar
- K. Shum and Victor K. Wei, A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection, Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'02), pp. 55--56, 2002. Google ScholarDigital Library
- D. R. Stinson, Cryptography: Theory and practice, Third Edition, Discrete mathematicsand its applications, 2006.Google Scholar
- H. M. Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, Vol. 22, No.8, pp. 717--722, 1999. Google ScholarDigital Library
- H. M. Sun. On proxy multi-signature scheme. In: Proceedings of the International Computer Symposium, pp. 65--72, 2000.Google Scholar
- H. M. Sun. Design of time-stamped proxy signatures with traceable receivers. IEE Proceedings of Computers and Digital Techniques, Vol. 147, No.6, pp. 462--466, 2000.Google ScholarCross Ref
- H.-M.Sun and B.-T.Hsieh, Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings, pp. 474--476, 2003.Google Scholar
- H. M. Sun, N. Y. Lee and T. Hwang. Threshold proxy signatures. IEE Proceedings of Computers and Digital Techniques, Vol. 146, No. 5, pp. 259--263, 1999.Google ScholarCross Ref
- G. Wang, F. Bao, J. Zhou and R. H. Deng. Security analysis of some proxy signatures. Available at http://eprint.iacr.org/2003/196/, 2003.Google Scholar
- L. Yi, G. Bai and G. Xiao. Proxy Multi-signature Scheme: A new type of proxy signature scheme. Electronics Letters, Vol. 36, No. 6, pp. 527--528, 2000.Google ScholarCross Ref
- L. Zahhafi and O. Khadir, A digital signature scheme based simultaneously on the DSA and RSA protocols, Gulf Journal of Mathematics, Vol 6, Issue 4, pp. 37--43, 2018.Google ScholarCross Ref
- K. Zhang. Threshold proxy signature schemes. In: Proceedings of Information Security Workshop, LNCS 1396, Springer-Verlag, pp. 191--197, 1997.Google Scholar
- K. Zhang. Nonrepudiable proxy signature schemes. Available at http://citeseer.nj.nec.com/360090.html/Google Scholar
Index Terms
- Amelioration of a proxy signature using RSA encryption
Recommendations
Certificateless proxy multi-signature
Proxy multi-signature allows a group of original signers to delegate their signing capabilities to a proxy signer in such a way that the proxy signer can sign messages on behalf of the group of original signers. Existing constructions of proxy multi-...
Proxy-protected signature secure against the undelegated proxy signature attack
The proxy signature scheme enables an original signer to delegate his/her signing capability to a designated proxy signer, thereby the proxy signer can sign messages on behalf of the original signer. Recently, Zhou et al. proposed two proxy-protected ...
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...
Comments