Skip to main content
Log in

A new proxy signature scheme with message recovery using self-certified public key

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages.JEICE Trans Fundam, 1996,E79-A(9): 1338–1354.

    Google Scholar 

  2. Lee B, Kim H, Kim K. Strong Proxy Signature and Its Application.Proceedings of the SCIS'2001, 11B-1, Osio, Japan, 2001. 603–608.http://caislab.icu.ac.kr/pub/paper_international/body.html.

  3. Lee B, Kim H, Kim K. Secure Mobile Agent Using Strong Non-designated Proxy Signature.Proceeding of the ACISP' 2001, Sydney. Berlin: Springer-Verlag, 2001. 474–486.

    Google Scholar 

  4. Kim H, Baek J, Lee B,et al. Computing with Secrets for Mobile Agent Using One-Time Proxy Signature.Proceeding of the SCIS'2001, 14C-3, Osio, Japan, 2001. 845–850.http://caislab.icu.ac.kr/pub/paper_international/body.html.

  5. Yi L J, Bai G Q, Xiao G Z. Proxy Multi-Signature Scheme: A New Type of Proxy Signature Scheme.Electronic Letters, 2000,36(6): 527–528.

    Article  Google Scholar 

  6. Zhang K. Threshold Proxy Signature Schemes.Proceeding of the 1997 Information Security Workshop, Ishikawa, Berlin: Springer-Verlag, 1998. 191–197.

    Google Scholar 

  7. Sun H M, Lee N Y, Hwang T. Threshold Proxy Signatures.IEE Proceedings-Computers and Digital Techniques. 1999,146(5): 259–263.

    Article  Google Scholar 

  8. Sun H M. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.Computer Communications, 1999,22(8): 717–722.

    Article  Google Scholar 

  9. Hwang M S, Lin I C, Lu E J L. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.International Journal of Informatica, 2000,11(2): 1–8.

    Google Scholar 

  10. Li Ji-guo, Cao Zhen-fu, Zhang Yi-chen. Improvement of M-U-O and K-P-W Proxy Signature Schemes.Journal of Harbin Institute of Technology, 2002,9(2): 145–148(Ch).

    Google Scholar 

  11. Li Ji-guo, Cao Zhen-fu. Improvement of a Threshold Proxy Signature Scheme.Journal of Computer Research and Development, 2002,39(11): 1513–1518(Ch).

    Google Scholar 

  12. Li Ji-guo, Cao Zhen-fu, Zhang Yi-chen. Nonrepudiable Proxy Multi-Signature Scheme.Journal of Computer Science and Technology. 2003,18(3): 399–402.

    Article  MathSciNet  Google Scholar 

  13. Li Ji-guo, Li Jian-zhong, Cao Zhen-fu,et al. Nonrepudiable Threshold Proxy Signeryption Scheme with Known Signers.Journal of Software, 2003,14(12): 2021–2027.

    Google Scholar 

  14. Girault M. Self-Certified Public Keys.Advances in Cryptology-Eurocrypt '91, Berlin: Springer-Verlag, 1991. 491–497.

    Google Scholar 

  15. Shao Zu-hua. Cryptographic Systems Using a Self-Certified Public Key Based on Discrete Logarithms.IEE Proceedings-Computers and Digital Techniques, 2001,148(6): 233–237.

    Article  Google Scholar 

  16. Wu Tzong-chen. Digital Signature/Multisignature Schemes Giving Public Key Verification and Message Recovery Simultaneously.International Journal of Computer Systems Science & Engineering, 2001,16(6): 329–337.

    Google Scholar 

  17. Tseng Y M, Jan J K, Chien H Y. Digital Signature with Message Recovery Using Self-Certified Public Keys and Its Variants.Applied Mathematics and Computation, 2003,136: 203–214.

    Article  MATH  MathSciNet  Google Scholar 

  18. Nyberg K, Rueppel R A. Message Recovery for Signature Scheme Based on Discrete Logarithm Problem.Designs Codes and Cryptography, 1996,7: 61–81.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Foundation item: Supported by the National Natural Science Fundation of China (60072018)

Biography: LI Ji-guo (1970-), male, Associate professor, Ph. D. research direction: information security, cryptography theory and its application, e-commerce, e-cash, etc.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ji-guo, L., Yi-chen, Z. & Yue-long, Z. A new proxy signature scheme with message recovery using self-certified public key. Wuhan Univ. J. Nat. Sci. 10, 219–222 (2005). https://doi.org/10.1007/BF02828654

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828654

Key words

CLC number

Navigation