An efficient proxy signature scheme in home network DRM
نویسندگان
چکیده
In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.
منابع مشابه
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...
متن کاملAn efficient blind signature scheme based on the elliptic curve discrete logarithm problem
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
متن کاملA Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
In 2004, Yang et al. proposed an efficient (t, n) threshold proxy signature scheme with known signers. However, Maimani et al. showed that a malicious original signer can forge a valid proxy signature for any message in Yang et al.’s scheme and further proposed an improvement to remedy such an attack. In this paper, we will show that in Maimani et al.s improvement, a malicious original or proxy...
متن کاملNew Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks
In order to reduce message flows of traditional anonymous authentication schemes, a new kind of delegationbased scheme is proposed for wireless roaming networks. By making use of a proxy signature, the new scheme requires only a user and a visited server to participate in the authentication process, without the real-time participation of user’s home server. Therefore, the new scheme needs less ...
متن کاملSecure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues
The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...
متن کامل