An Efficient Proxy Signature Scheme Based On RSA Cryptosystem
نویسندگان
چکیده
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose proxy signature scheme based on RSA cryptosystem. Our scheme does not consider proxy revocation mechanism, but it is efficient than the existing RSA-based schemes.
منابع مشابه
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t − 1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite commo...
متن کاملAttacks on a threshold proxy signature scheme based on the RSA cryptosystem
Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...
متن کاملCryptanalysis and Improvement of a Secure Proxy Signature Scheme Based on Elliptic Curve Cryptosystem
Based on the RSA problem, Zhou et al.’s proposed a proxy-protected proxy signature scheme. They claimed that their scheme were secure and efficient. However, this paper shows that their proposed proxy-protected proxy signature scheme is insecure against the replaced warrant attack: the original signer can remove the old warrant from a valid proxy signature and then construct a new warrant, and ...
متن کاملComments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem"
In a ðt; nÞ threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but ðtÿ 1Þ or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the di...
متن کاملSecurity pitfalls of an efficient threshold proxy signature scheme for mobile agents
A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013