A Secure Non-Repudiable General Proxy Signature
نویسندگان
چکیده
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages on behalf of an original signer, but or fewer proxy signers cannot. In this paper, in order to adapt to some practical applications, by a modification of Hu threshold proxy signature, we propose a novel secure variation of proxy signature scheme called general proxy signature scheme. This scheme has some advantages over the threshold scheme, in the sense that the subsets of proxy group that allow to sign messages on behalf of an original signer, are not necessarily defined according to their cardinality and it becomes this proposed concept more attractive and practical when the members of a proxy group do not all have the same power or influence. Also, it is more efficient. This scheme is proved to enjoy security against the existing attacks.
منابع مشابه
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers
In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.’s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall pr...
متن کاملObtaining Non-repudiable Proof of Active Attacks in DSR
Many secure MANET routing protocols have been proposed in the literature which employ non repudiable cryptographic authentication. However, they have not been explicitly designed to provide non repudiable proof of active attacks (NPAA). For example, Ariadne with digital signatures (ADS) is a secure extension of DSR which requires every node forwarding a route request to append a digital signatu...
متن کاملA Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
In 2004, Yang et al. proposed an efficient (t, n) threshold proxy signature scheme with known signers. However, Maimani et al. showed that a malicious original signer can forge a valid proxy signature for any message in Yang et al.’s scheme and further proposed an improvement to remedy such an attack. In this paper, we will show that in Maimani et al.s improvement, a malicious original or proxy...
متن کاملA Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of...
متن کاملSecure Mobile Agent Using Strong Non-designated Proxy Signature
It is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer without exposing his/her private key, it can be used not only to search for special products or services, but also to make a contract with a remote server. To construct mobile agents, [KBC00] used an RSA-base...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015