Self Proxy Signature Scheme*
نویسندگان
چکیده
The proxy signature scheme is a kind of digital signature scheme. In the proxy signature scheme, one user, called the original signer, can delegate his/her signing capability to another user called the proxy signer. This is similar to a person delegating his/her seal to another person in the real world. In this paper, we propose a new type of proxy signature scheme, the self proxy signature scheme. In this scheme, a signer, Alice, delegates her signing capability to herself and uses the proxy private/public key pair as temporary keys. Using this scheme, the signer protects her original private/public key pair and uses multiple private/public key pairs simultaneously. Therefore, the signer Alice uses a temporary key pair for only a particular work. Furthermore, it is easy to revoke the temporary private/public key pair. Thus, it can be said that the proposed scheme is practical.
منابع مشابه
An Efficient Self Proxy Signature Scheme Based on Elliptic Curve Discrete Logarithm Problems
Self proxy signature is a type of proxy signature wherein, the original signer delegates the signing rights to himself, there by generating temporary public and private key pairs for himself. The aim of self proxy is to protect the signer's permanent secret key. Most of proposed self proxy signature scheme have been based on discrete logarithms which required for a protocol to generate and veri...
متن کاملAn Efficient Identity Based Self Proxy Signature Scheme with Warrant
In the proxy signatures an original signer delegates his signing rights to the other entity but in a self proxy signature scheme, user delegates his signing rights to himself and generates the temporary key pairs. In a self proxy signature, a user can generate multiple number of temporary keys (depending on the application), so as to prevent the exposure of his private key from repeated use. Th...
متن کاملAn ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...
متن کاملStrong Proxy Signature and its Applications
Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. In this paper we show various attack scenarios against previous proxy signature schemes, which shows that proxy signature schemes should be designed very carefully. Based on these weaknesses, we prov...
متن کاملNew Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in e-cash and e-commerce. In this paper, we present a verifiable self-certified public key scheme and a proxy blind signature scheme using the verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. As far a...
متن کاملA Novel Secure Self Proxy Signature Scheme
Recently, Kim et al.’s proposed a new type of proxy signature scheme, called self proxy signature scheme. In their scheme, a signer, delegates his/her signing capability to himself/herself and uses the proxy private/public key pair as temporary keys. In this paper, we will demonstrate some security leaks inherent in Kim et al.’s scheme and show that an adversary can forge a valid self proxy sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007