An efficient proxy signature scheme in home network DRM

نویسندگان

  • Xiaoyun Wang
  • Kefei Chen
چکیده

In this paper we overview the existing home network DRM schemes and especially Philips’ invention. Then we propose to use the proxy signature to simplify the authentication of certificate chain in Philips’ scheme. And we also give an efficient scheme of proxy signature based on the characters of certificate chain. We then give a detailed security analysis to show that our scheme meets the six properties of proxy signature. Finally the paper points that we should go ahead to improve the efficiency of home network DRM scheme and show a kinder interface to digital home consumers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes

This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers

In 2004, Yang et al. proposed an efficient (t, n) threshold proxy signature scheme with known signers. However, Maimani et al. showed that a malicious original signer can forge a valid proxy signature for any message in Yang et al.’s scheme and further proposed an improvement to remedy such an attack. In this paper, we will show that in Maimani et al.s improvement, a malicious original or proxy...

متن کامل

New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks

In order to reduce message flows of traditional anonymous authentication schemes, a new kind of delegationbased scheme is proposed for wireless roaming networks. By making use of a proxy signature, the new scheme requires only a user and a visited server to participate in the authentication process, without the real-time participation of user’s home server. Therefore, the new scheme needs less ...

متن کامل

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues

The term “proxy multi-signature” refers to the situation in which a proxy signer is authorized to sign a message on behalf of a group of original signers. Combined with identity-based cryptography, we proposed an efficient identity-based proxy multi-signature scheme using cubic residues without bilinear pairing. Our scheme is secure against existential forgery on adaptive chosenmessage and iden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005