Further Study on Proxy Authorization and Its Scheme
نویسندگان
چکیده
Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multiparty proxy authorization scheme, a group of n members can cooperate to entrust their right, and the authorizing right can be supervised by secret sharing mechanism. In the second multicast proxy authorization scheme, the members can entrust their right in multicast mode. The multicasting design strategy prevents coalition attack, avoids the problem of generalized signature forgery. In the last conditionally anonymous scheme, the identity blinding algorithm enables the proxy signer to be anonymous and the anonymity can also be revoked if necessary. This design strategy avoids the misuse of proxy authorization and renders effective supervision on signature entrusting and proxy signing.
منابع مشابه
Proxy Means Tests for Targeting Subsidies Scheme in Iran
In this paper I develop a Proxy Means Tests (PMT) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in Iran. Based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. This will result in the highest accuracy main...
متن کاملCertificateless Identity-based Proxy Signature for Grid Computing Authorization
In this paper we propose a new Identity-based certificateless proxy signature transferable to a chain of proxy signers enabling fine-grained delegation, Authentication and Authorization decoupling, and Attributes-based Authorization within the Grid environment without relying on any kind of PKI certificates, proxy certificates or attribute certificates. Security and performance analysis of the ...
متن کاملMultiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks
Although current online social networks (OSNs) schemes propose to encrypt data before sharing, the enforcement of access policies over encrypted data has become a challenging task, and the OSNs currently do not provide any mechanism to allow users to update access policies. In this paper, we propose a ciphertext sharing scheme in cloudbased OSNs, which allows the users to outsource encrypted da...
متن کاملAn Application of Policy-Based Signature: Proof-Carrying Proxy Certificates
The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this p...
متن کاملProof-Carrying Proxy Certificates
The term proxy certificate is used to describe a certificate that is issued by an end user for the purpose of delegating responsibility to another user so that the latter can perform certain actions on behalf of the former. Such certificates have been suggested for use in a number of applications, particularly in distributed computing environments where delegation of rights is common. In this p...
متن کامل