Abstract
A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages.JEICE Trans Fundam, 1996,E79-A(9): 1338–1354.
Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application.Proceedings of the SCIS'2001, 11B-1, Osio, Japan, 2001. 603–608.http://caislab.icu.ac.kr/pub/paper_international/body.html.
Lee B, Kim H, Kim K. Secure Mobile Agent Using Strong Non-designated Proxy Signature.Proceeding of the ACISP' 2001, Sydney. Berlin: Springer-Verlag, 2001. 474–486.
Kim H, Baek J, Lee B,et al. Computing with Secrets for Mobile Agent Using One-Time Proxy Signature.Proceeding of the SCIS'2001, 14C-3, Osio, Japan, 2001. 845–850.http://caislab.icu.ac.kr/pub/paper_international/body.html.
Yi L J, Bai G Q, Xiao G Z. Proxy Multi-Signature Scheme: A New Type of Proxy Signature Scheme.Electronic Letters, 2000,36(6): 527–528.
Zhang K. Threshold Proxy Signature Schemes.Proceeding of the 1997 Information Security Workshop, Ishikawa, Berlin: Springer-Verlag, 1998. 191–197.
Sun H M, Lee N Y, Hwang T. Threshold Proxy Signatures.IEE Proceedings-Computers and Digital Techniques. 1999,146(5): 259–263.
Sun H M. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.Computer Communications, 1999,22(8): 717–722.
Hwang M S, Lin I C, Lu E J L. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.International Journal of Informatica, 2000,11(2): 1–8.
Li Ji-guo, Cao Zhen-fu, Zhang Yi-chen. Improvement of M-U-O and K-P-W Proxy Signature Schemes.Journal of Harbin Institute of Technology, 2002,9(2): 145–148(Ch).
Li Ji-guo, Cao Zhen-fu. Improvement of a Threshold Proxy Signature Scheme.Journal of Computer Research and Development, 2002,39(11): 1513–1518(Ch).
Li Ji-guo, Cao Zhen-fu, Zhang Yi-chen. Nonrepudiable Proxy Multi-Signature Scheme.Journal of Computer Science and Technology. 2003,18(3): 399–402.
Li Ji-guo, Li Jian-zhong, Cao Zhen-fu,et al. Nonrepudiable Threshold Proxy Signeryption Scheme with Known Signers.Journal of Software, 2003,14(12): 2021–2027.
Girault M. Self-Certified Public Keys.Advances in Cryptology-Eurocrypt '91, Berlin: Springer-Verlag, 1991. 491–497.
Shao Zu-hua. Cryptographic Systems Using a Self-Certified Public Key Based on Discrete Logarithms.IEE Proceedings-Computers and Digital Techniques, 2001,148(6): 233–237.
Wu Tzong-chen. Digital Signature/Multisignature Schemes Giving Public Key Verification and Message Recovery Simultaneously.International Journal of Computer Systems Science & Engineering, 2001,16(6): 329–337.
Tseng Y M, Jan J K, Chien H Y. Digital Signature with Message Recovery Using Self-Certified Public Keys and Its Variants.Applied Mathematics and Computation, 2003,136: 203–214.
Nyberg K, Rueppel R A. Message Recovery for Signature Scheme Based on Discrete Logarithm Problem.Designs Codes and Cryptography, 1996,7: 61–81.
Author information
Authors and Affiliations
Additional information
Foundation item: Supported by the National Natural Science Fundation of China (60072018)
Biography: LI Ji-guo (1970-), male, Associate professor, Ph. D. research direction: information security, cryptography theory and its application, e-commerce, e-cash, etc.
Rights and permissions
About this article
Cite this article
Ji-guo, L., Yi-chen, Z. & Yue-long, Z. A new proxy signature scheme with message recovery using self-certified public key. Wuhan Univ. J. Nat. Sci. 10, 219–222 (2005). https://doi.org/10.1007/BF02828654
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02828654