Fully Distributed Proxy Signature Schemes
نویسندگان
چکیده
In a proxy signature scheme, a potential signer delegates his signing capability to a proxy entity, who signs a message on behalf of the original signer. All the proposals of proxy signature schemes made until now have been based on Schnorr's signature scheme. Threshold versions of these schemes have also been proposed, in which the power of the proxy signer is distributed among a group of players, in such a way that any subset with a minimum number (threshold) of players can sign a message on behalf of the original signer. We consider a model that is fully distributed, because we want to distribute not only the power of the proxy signer, but also the original signer ability to delegate his signing capability. Furthermore, we consider general structures, instead of only the threshold ones, for both the tolerated subsets of dishonest players and the subsets of honest players authorized to execute a valid instance of the protocol, and in both the original and the proxy signer entities. We nd suÆcient combinatorial conditions that these structures must satisfy in order to design a fully distributed, secure and robust proxy signature scheme for this general scenario. We propose such a scheme for this setting. It is based on the results of [8] and [15], and inherits the security of these two works.
منابع مشابه
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both identities: that of the delegator and that of the proxy signer. There are many proposals of proxy signature schemes, but security of them has not been considered in a formal way until the appearance of [2, 8]. If the ...
متن کاملSecurity Analysis of Some Proxy Signatures
A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1...
متن کاملNonrepudiable Proxy Signature Schemes
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. Existing proxy signature schemes don't support nonrepudiation. Nonrepudiation means signature signer, both the original and proxy signers, cannot falsely deny later that he generated a signature. In practice, it is important and, som...
متن کاملA Secure Nominative Proxy Signature Scheme for Distributed Shared Object Systems
------------------------------------------------------------------ABSTRACT----------------------------------------------------------------Digital signature scheme is an important research topic in cryptography. An ordinary digital signature scheme allows a signer to create signatures of documents and the generated signatures can be verified by any person. A proxy signature scheme, a variation o...
متن کاملEfficient Multi-Proxy Signature Scheme with Short Length in the Standard Model
As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2002 شماره
صفحات -
تاریخ انتشار 2002