Design of Proxy Signature in the Digital Signature Algorithm (DSA)
نویسندگان
چکیده
The use of proxy signature has attracted considerable attention and has been deployed in many applications. Unfortunately, most of the proxy signature schemes, which have been proposed up to now, are not based on standard signature such as Digital Signature Algorithm (DSA). Consequently, those proposals have inevitably been considered infeasible because of obvious security weaknesses so they suffer from new attacks. In fact, with the application of standard signature like DSA, which has been fully discussed, a proxy signature scheme could be well accepted for the deployment in many applications. Therefore, we propose a new proxy signature scheme which combines the DSA properties with proxy signatures. In other words, our scheme keeps not only the properties of the DSA but also fulfills the requirements of proxy signatures. We hope our new proxy signature based on DSA combining Public-key infrastructure (PKI) mechanism could be used in practice as well as the conventional DSA.
منابع مشابه
A Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملA post-quantum proxy signature scheme based on rainbow digital signature
Quantum computers have recently emerged as a threat to the traditional public key cryptosystems based on the difficult problems of integer factoring, discrete logarithm, and elliptic curve, such as RSA, DSA, ElGamal, and ECC. The proxy signature schemes based on these cryptosystems have been threatened at the same time. So it is important to propose efficient and secure proxy signature schemes ...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملISSN 1392–124X (print), ISSN 2335–884X (online) INFORMATION TECHNOLOGY AND CONTROL
The elliptic curve cryptosystem (ECC) achieves the security level equivalent to that of digital signature algorithm (DSA), but has a lower computational cost and a smaller key size than the DSA. Till now so many proxy multi-signature schemes based on ECC without pairings have been proposed. To the best of our knowledge, none of them are provable secure. Having motivated, we first define a forma...
متن کاملAn Efficient Self Proxy Signature Scheme Based on Elliptic Curve Discrete Logarithm Problems
Self proxy signature is a type of proxy signature wherein, the original signer delegates the signing rights to himself, there by generating temporary public and private key pairs for himself. The aim of self proxy is to protect the signer's permanent secret key. Most of proposed self proxy signature scheme have been based on discrete logarithms which required for a protocol to generate and veri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 22 شماره
صفحات -
تاریخ انتشار 2006