Secure Proxy Digital Signature Scheme using Digital Signature Standard with Random Key Generation Process
نویسنده
چکیده
Now a days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction system. In this sequence proxy digital signature may play an important role to achieve the security goals. Proxy Digital signature is the process of authorized signatory of the document by one person on behalf of other one. None of the proxy signature schemes which have been proposed up to now, are based on Digital Signature Standard (DSS) cryptosystem with changing random key values dynamically. Therefore, these proposals have unavoidably been considered infeasible because of obvious security weaknesses, so they suffer from new attacks. Consequently, I propose a new proxy signature scheme which combines the Digital Signature Standard (DSS) properties with random key generation. Finally, a DSS proxy digital signature system is implemented and its time complexity is analyzed.
منابع مشابه
A Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملA Provably Secure Certificateless Proxy Signature Scheme
Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...
متن کاملA Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of...
متن کاملA provable secure anonymous proxy signature scheme without random oracles
In order to protect the proxy signers’ privacy, many anonymous proxy signature schemes which are also called proxy ring signatures, have been proposed. Although the provable security in the random oracle model has received a lot of criticism, there is no provable secure anonymous proxy signature scheme without random oracles. In this paper, we propose the first provable secure anonymous proxy s...
متن کاملSecurity Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more effi...
متن کامل