A Proxy E-Raffle Protocol Based on Proxy Signatures
نویسندگان
چکیده
In 2009, Chang and Cheng proposed an efficient proxy raffle protocol. In their scheme, the raffle tickets are known by participants as well as raffle organizers. Hence, unless we implicitly add the unrealistic assumption that the organizer is trustworthy, this may cause problems and threaten the security of the e-raffle from the viewpoint of participants. In this paper, we use the concept of proxy signatures and symmetric cryptography to propose an efficient proxy raffle scheme which overcomes this weakness. We show that the proposed scheme achieves all other security requirements mentioned in the literature. The proposed scheme is shown to outperform the scheme of Chang and Cheng in terms of communication load and computational complexity.
منابع مشابه
Fractured Reservoirs History Matching based on Proxy Model and Intelligent Optimization Algorithms
In this paper, a new robust approach based on Least Square Support Vector Machine (LSSVM) as a proxy model is used for an automatic fractured reservoir history matching. The proxy model is made to model the history match objective function (mismatch values) based on the history data of the field. This model is then used to minimize the objective function through Particle Swarm Optimization (...
متن کاملPrivacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this delegated set on behalf of the originator. Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [27] and warrant-hiding proxy signatures [28], have been introduced. In thi...
متن کاملStrong Proxy Signature and its Applications
Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. In this paper we show various attack scenarios against previous proxy signature schemes, which shows that proxy signature schemes should be designed very carefully. Based on these weaknesses, we prov...
متن کاملA novel efficient (t, n) threshold proxy signature scheme
All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Therefore, it is necessary for the proxy signers to perform many expensive modular exponential computations and communications to obtain and verify a shared secret. Moreover, most of the existing threshold proxy si...
متن کاملSecurity Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more effi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JoWUA
دوره 2 شماره
صفحات -
تاریخ انتشار 2011