Proxy Signature Scheme for Warrant Partial Delegation
نویسندگان
چکیده
The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. Till now we have the following types of delegations. In general, there are three different types of delegations: full delegation, partial delegation and delegation by warrant. In a full delegation proxy signature scheme, a proxy signer uses the same private key as an original signer and creates the proxy signature as an original signer does. The drawback of a full delegation comes from a difficulty of distinctive between an original signer and a proxy signer. In a partial delegation proxy signature scheme, the original signer derives the proxy key from his private key and passes it to the proxy signer in a secure channel. In the proxy signature scheme with delegation by warrant, an original signer provides the proxy signer a special message namely warrant. The warrant certifies that a proxy signer is legal and contains signer identity, delegation period and the types of a message on which a proxy signer can sign. Also, there are two types in the second one: protected and unprotected proxy signature schemes. In unprotected proxy signature scheme, a proxy signature is generated by both the proxy signer and an original signer. In this case, the verifier cannot distinguish the identity of a signer. In the protected proxy signature scheme, a proxy signature is generated by the proxy signature key of an original signer and also with a private key of a proxy signer. PROXY SIGNATURE SCHEME FOR WARRANT PARTIAL DELEGATION
منابع مشابه
A Practical Proxy Sign a Ture Scheme 296
A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present two efficient types of proxy signature scheme. The first one is the proxy signature for warrant partial delegation combines an advantage of two well known warrant partial delegation schemes. This proposed ...
متن کاملA Multi-proxy Signature Scheme for Partial delegation with Warrant
In some cases, the original signer may delegate its signing power to a specified proxy group while ensuring individual accountability of each participant signer. The proxy signature scheme that achieves such purpose is called the multi-proxy signature scheme and the signature generated by the specified proxy group is called multi-proxy signature for the original signer. Recently such scheme has...
متن کاملA Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose a new type of digital proxy signature scheme in which the warrant message can be recovered from the proxy signature. In this scheme the warrant message is conveyed within the pr...
متن کاملSecurity Arguments for Partial Delegation with Warrant Proxy Signature Schemes
Proxy signature is an important cryptographic primitive and has been suggested in numerous applications. In this paper, we present an attack on the aggregate-signaturebased proxy signature schemes, then point out there are two flaws in BPW notion of security for proxy signature. Furthermore, we give arguments for partial delegation with warrant proxy signature schemes. We construct a new proxy ...
متن کاملAn Improved Threshold Proxy Signature Scheme Based on RSA
This paper proposes an improved RSA-based threshold proxy signature scheme. The proposed scheme satisfies the necessary security requirements of proxy signature such as verifiability, unforgeability, threshold property and identifiability. The proposed scheme does not require any secure channel to deliver the proxy keys any more. Introduction A proxy signature scheme involves three entities: an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012