×

zbMATH — the first resource for mathematics

A new proxy signature scheme with revocation. (English) Zbl 1060.94037
Summary: In current proxy signature schemes, an original signer delegates her/his signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they are in general defective in proxy revocations. In this paper, we propose a proxy signature scheme which allows the original signer to revoke delegations whenever necessary.

MSC:
94A62 Authentication, digital signatures and secret sharing
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Hwang, M.S.; Lin, I.C.; Lu, E.J.L., A secure nonrepudiable threshold proxy signature scheme with known signers, Informatica, 11, 2, 1-8, (2000) · Zbl 0957.68041
[2] Seungjoo Kim, Sangjoo Park, Dongho Won, Proxy signatures, revisited, in: Proceedings of International Conference on Information and Communications Security, Lecture Notes in Computer Science, vol. 1334, 1997, pp. 223-232
[3] Byoungcheon Lee, Heesun Kim, Kwangjo Kim, Strong proxy signature and its applications, in: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), Shirahama, 2001 · Zbl 0994.68562
[4] Eric Jui-Lin Lu, Cheng-Jian Huang, Cryptanalysis of a time-stamped proxy signature scheme, Int. J. Informatica, in press · Zbl 1071.94015
[5] Masahiro, Mambo; Usuda, Keisude; Okamoto, Eiji, Proxy signatures: delegation of the power to sign messages, IEICE trans. fundament, E79-A, 9, 1338-1354, (1996)
[6] Mambo Masahiro, Keisuke Usuda, Eiji Okamoto, Proxy signatures for delegating signing operation, in: Proceedings of 3rd ACM conference on Computer and Communications Security, 1996, New Delhi, pp. 48-57
[7] B. Clifford Neuman, Proxy-based authorization and accounting for distributed systems, in: Proceedings of the 13th International Conference on Distributed Computing Systems, 1993, Pittsburgh, PA, pp. 283-291
[8] Schneier, Bruce, Applied cryptography, (1996), Wiley New York · Zbl 0853.94001
[9] Schnorr, Claus-Peter, Efficient signature generation by smart cards, J. cryptol, 4, 161-174, (1991) · Zbl 0743.68058
[10] Sun, Hung-Min, Design of time-stamped proxy signatures with traceable receivers, IEE proc. comp. digital techn, 147, 6, 462-466, (2000)
[11] Vijay Varadharajan, Phillip Allen, Stewart Black, An analysis of the proxy problem in distributed systems, in: Proceedings of 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 255-275
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.