Proxy Signature Scheme for Warrant Partial Delegation

نویسندگان

  • Sattar J Aboud
  • Mohammad Al-fayoumi
چکیده

The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. Till now we have the following types of delegations. In general, there are three different types of delegations: full delegation, partial delegation and delegation by warrant. In a full delegation proxy signature scheme, a proxy signer uses the same private key as an original signer and creates the proxy signature as an original signer does. The drawback of a full delegation comes from a difficulty of distinctive between an original signer and a proxy signer. In a partial delegation proxy signature scheme, the original signer derives the proxy key from his private key and passes it to the proxy signer in a secure channel. In the proxy signature scheme with delegation by warrant, an original signer provides the proxy signer a special message namely warrant. The warrant certifies that a proxy signer is legal and contains signer identity, delegation period and the types of a message on which a proxy signer can sign. Also, there are two types in the second one: protected and unprotected proxy signature schemes. In unprotected proxy signature scheme, a proxy signature is generated by both the proxy signer and an original signer. In this case, the verifier cannot distinguish the identity of a signer. In the protected proxy signature scheme, a proxy signature is generated by the proxy signature key of an original signer and also with a private key of a proxy signer. PROXY SIGNATURE SCHEME FOR WARRANT PARTIAL DELEGATION

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Practical Proxy Sign a Ture Scheme 296

A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present two efficient types of proxy signature scheme. The first one is the proxy signature for warrant partial delegation combines an advantage of two well known warrant partial delegation schemes. This proposed ...

متن کامل

A Multi-proxy Signature Scheme for Partial delegation with Warrant

In some cases, the original signer may delegate its signing power to a specified proxy group while ensuring individual accountability of each participant signer. The proxy signature scheme that achieves such purpose is called the multi-proxy signature scheme and the signature generated by the specified proxy group is called multi-proxy signature for the original signer. Recently such scheme has...

متن کامل

A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures

Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose a new type of digital proxy signature scheme in which the warrant message can be recovered from the proxy signature. In this scheme the warrant message is conveyed within the pr...

متن کامل

Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes

Proxy signature is an important cryptographic primitive and has been suggested in numerous applications. In this paper, we present an attack on the aggregate-signaturebased proxy signature schemes, then point out there are two flaws in BPW notion of security for proxy signature. Furthermore, we give arguments for partial delegation with warrant proxy signature schemes. We construct a new proxy ...

متن کامل

An Improved Threshold Proxy Signature Scheme Based on RSA

This paper proposes an improved RSA-based threshold proxy signature scheme. The proposed scheme satisfies the necessary security requirements of proxy signature such as verifiability, unforgeability, threshold property and identifiability. The proposed scheme does not require any secure channel to deliver the proxy keys any more. Introduction A proxy signature scheme involves three entities: an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012