A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

نویسندگان

  • K. Shum
  • Victor K.-W. Wei
چکیده

-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We also discuss other applications of this technique.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection

In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate the signing capability to a proxy signer. Various constructions were made to devise a strong nondesignated proxy signature scheme. In 2002, Shum and Wei proposed an extended scheme to hide the identity of the proxy signer. A Trusted Authority (TA) can reveal the proxy signer’s identity if required. ...

متن کامل

A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

A proxy signature scheme enables an entity to delegate its signing rights to another entity. Since the proxy signature concept was proposed by Mambo et al., many variant schemes have been appeared. In this paper, we propose a new proxy signature scheme with a proxy signer's privacy protection. In proxy signer's privacy scenario, the identity of the proxy signer cannot be revealed in a proxy sig...

متن کامل

Further Cryptanalysis of some Proxy Signature Schemes

Proxy signature is a signature that an original signer delegates his or her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. However, Sun et al. [7] showed that the proxy and multi-proxy signatures of Lee et al. [3], and the strong proxy signature scheme with proxy signer privacy protection of Shum et al. [6] are not against t...

متن کامل

Cryptanalysis of A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

rant as a part information of verification. Furthermore, in terms of proxy delegation steps, some proxy signature schemes are non-interactive [46] and some schemes [7] are interactive. No matter what kind of proxy signature Recently, Shum and Wei proposed an enhancement to the Lee et Proxy signature such that the schemes, a proxy scheme provide good proxy signer's identity is hidden behind an a...

متن کامل

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Applied Mathematics and Computation

دوره 161  شماره 

صفحات  -

تاریخ انتشار 2002