Skip to main content

A Generic Construction for Proxy Signature Scheme

  • Conference paper
Artificial Intelligence and Computational Intelligence (AICI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7003))

  • 2127 Accesses

Abstract

In proxy signature, the original signer can delegate his signature power to the proxy signer. Due to the extensive application of proxy signature, some schemes have been presented, but there is not a general model for proxy signature scheme, especially for the scheme with good properties. In this paper, we give the first generic model and security model for proxy-protected anonymous proxy signature, in which only the proxy signer can sign the messages for the original signer. Finally, we give one concrete scheme according to the model as example.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans., Fundations E79-A(9), 1338–1353 (1996)

    Google Scholar 

  2. Hang, H.F., Chang, C.C.: A novel efficient (t, n) threshold proxy signature scheme. Inform. Sci. 176(10), 1338–1349 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  3. Hsu, C.L., Tsai, K.Y., Tsai, P.L.: Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Inform. Sci. 177(2), 543–549 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  4. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), New Delhi, India, pp. 48–57 (1996)

    Google Scholar 

  5. Zhou, Y., Cao, Z.-F., Chai, Z.: An Efficient Proxy-Protected Signature Scheme Based on Factoring. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 332–341. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, G. (2011). A Generic Construction for Proxy Signature Scheme. In: Deng, H., Miao, D., Lei, J., Wang, F.L. (eds) Artificial Intelligence and Computational Intelligence. AICI 2011. Lecture Notes in Computer Science(), vol 7003. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23887-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23887-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23886-4

  • Online ISBN: 978-3-642-23887-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics