An Efficient Proxy Signature Scheme Based On RSA Cryptosystem

نویسندگان

  • Swati Verma
  • Birendra Kumar Sharma
  • Ravishankar Shukla
چکیده

A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose proxy signature scheme based on RSA cryptosystem. Our scheme does not consider proxy revocation mechanism, but it is efficient than the existing RSA-based schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem

In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t − 1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite commo...

متن کامل

Attacks on a threshold proxy signature scheme based on the RSA cryptosystem

Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...

متن کامل

Cryptanalysis and Improvement of a Secure Proxy Signature Scheme Based on Elliptic Curve Cryptosystem

Based on the RSA problem, Zhou et al.’s proposed a proxy-protected proxy signature scheme. They claimed that their scheme were secure and efficient. However, this paper shows that their proposed proxy-protected proxy signature scheme is insecure against the replaced warrant attack: the original signer can remove the old warrant from a valid proxy signature and then construct a new warrant, and ...

متن کامل

Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem"

In a ðt; nÞ threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but ðtÿ 1Þ or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the di...

متن کامل

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents

A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013