An Efficient Identity Based Self Proxy Signature Scheme with Warrant

نویسنده

  • Vandani Verma
چکیده

In the proxy signatures an original signer delegates his signing rights to the other entity but in a self proxy signature scheme, user delegates his signing rights to himself and generates the temporary key pairs. In a self proxy signature, a user can generate multiple number of temporary keys (depending on the application), so as to prevent the exposure of his private key from repeated use. This paper presents An Efficient Self Proxy Signature Scheme With Warrant based on Identity Based cryptography. We also present the comparative study of the scheme and security analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings

Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...

متن کامل

Cryptanalysis and Improvement of a Secure Proxy Signature Scheme Based on Elliptic Curve Cryptosystem

Based on the RSA problem, Zhou et al.’s proposed a proxy-protected proxy signature scheme. They claimed that their scheme were secure and efficient. However, this paper shows that their proposed proxy-protected proxy signature scheme is insecure against the replaced warrant attack: the original signer can remove the old warrant from a valid proxy signature and then construct a new warrant, and ...

متن کامل

Proxy Signature Scheme for Warrant Partial Delegation

The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. ...

متن کامل

A Practical Proxy Sign a Ture Scheme 296

A proxy signature scheme is a variation of the ordinary digital signature scheme which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present two efficient types of proxy signature scheme. The first one is the proxy signature for warrant partial delegation combines an advantage of two well known warrant partial delegation schemes. This proposed ...

متن کامل

Cryptanalysis of A Self-Certified Threshold Proxy Signature Scheme Ased on Elliptic Curve Discrete Logarithm Problem

Digital signatures based on self-certified public key systems are more efficient because the authentication of the users’ public keys can be implicitly accomplished with the signature verification. In 2009, Xue et al. proposed first self-certified threshold proxy signature scheme based on the elliptic curve discrete logarithm problem (ECDLP). In this paper, we show that Xue et al.’s scheme can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012