Skip to main content
Log in

Proxy signature-based role delegation scheme: formal analysis and simulation

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of digital signature found their importance in e-governance and finance domain for authority delegation. Role based delegation proposed in this research work is aimed for providing in roles rights in the signature form to the individual in the terms of proxy signature. Various proxy signature delegation schemes are studied and compared on the parameter’s security, efficiency and key management majorly. Forward secure proxy key generation and verification scheme Ro-De-PSA is proposed based on Elliptic curve cryptography (ECC). The correctness of the proposed algorithm is analysed using BAN logic and the security analysis is performed using AVISPA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Not applicable.

References

  1. Aggarwal S, Kumar N (2021) Digital signatures. Advances in Computers, vol 121. Elsevier, pp 95–107

    Google Scholar 

  2. Finandhita A, Afrianto I (2018) Development of e-diploma system model with digital signature authentication. IOP Conference Series: Materials Science and Engineering, vol 407. IOP Publishing, p 012109

    Google Scholar 

  3. Bannore A, Patil RY, Devane SR (2022) An efficient proxy signature–based authority delegation scheme for medical cyber physical systems. Cyber Security Threats and Challenges Facing Human Life. Chapman and Hall/CRC, pp 13–23

    Chapter  Google Scholar 

  4. Patil RY, Bannore A (2022). Provably secure role delegation scheme for medical cyber-physical systems. Security Analytics: A Data Centric Approach to Information Security.

  5. Patil RY (2023). A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. International Journal of Information Technology. 1 11.

  6. Singh T, Kumar M, Gelmecha DJ, Thakur GK, Tyagi V, Sori WJ (2023). A lightweight identity based generalized signcryption scheme for secure communication in standard model. International Journal of Information Technology, 1 9

  7. Ajay D, Devi S (2016) E-Governance status in India. International Journal of Computer

  8. Mittal P, Kaur A (2013) E-Governance-A challenge for India. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(3):1196

    Google Scholar 

  9. Mohammed A, Drew S (2010) Implementation of e-government: advantages and challenges. International Association for Scientific Knowledge (IASK)

  10. Chan CM, Lau Y, Pan SL (2008) E-government implementation: A macro analysis of Singapore’s e-government initiatives. Gov Inf Q 25(2):239–255

    Article  Google Scholar 

  11. Aparna Bannore, Satish Devane , Use of Proxy Signature in e-Governance, in second international conference on Information and communication

  12. Boldyreva A, Palacio A, Warinschi B (2012) Secure proxy signature schemes for delegation of signing rights. J Cryptol 25:57–115

    Article  MathSciNet  Google Scholar 

  13. Lee B, Kim H, Kim K (2001). Strong proxy signature and its applications. Proceedings of SCIS 2001 603 608

  14. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: Delegation of the power to sign messages. IEICE Trans Fundam Electron Commun Comput Sci 79(9):1338–1354

    Google Scholar 

  15. Alomair B, Sampigethaya K, Poovendran R (2008) Efficient generic forward-secure signatures and proxy signatures. Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16–17, 2008 Proceedings 5. Springer, Berlin Heidelberg, pp 166–181

    Google Scholar 

  16. He J, Li X, Li L, Tang C (2010) A new forward-secure proxy signature scheme. 2010 International Forum on Information Technology and Applications, vol 2. IEEE, pp 30–33

    Chapter  Google Scholar 

  17. Chang MH, Lin TS, Yeh YS (2003) Forward secure proxy signature scheme

  18. Bannore A, Devane S (2018) ECC based proxy signature scheme with forward security. Smart Secure Systems–IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings 2. Springer, Singapore, pp 126–138

    Google Scholar 

  19. Schröder D, Unruh D (2012) Security of blind signatures revisited. International Workshop on Public Key Cryptography. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 662–679

    Google Scholar 

  20. Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361–396

    Article  Google Scholar 

  21. Chaum D, Van Heyst E (1991) Group signatures. Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings 10. Springer, Berlin Heidelberg, pp 257–265

    Google Scholar 

  22. Bellare M, Shi H, Zhang C (2005) Foundations of group signatures: The case of dynamic groups. Cryptographers’ track at the RSA conference. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 136–153

    Google Scholar 

  23. Camenisch J, Groth J (2004) Group signatures: Better efficiency and new theoretical aspects. International Conference on Security in Communication Networks. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 120–133

    Google Scholar 

  24. Fazlagic S, Behlilovic N (2012) Controlled delegation of signature in workflow systems. 20th Telecommunications Forum (TELFOR), 2012. IEEE, pp 1389–1392

    Chapter  Google Scholar 

  25. Ali A, Habiba U, Shibli MA (2015) Taxonomy of delegation model. Information Technology-New Generations (ITNG), 2015 12th International Conference on. IEEE, pp 218–223

    Google Scholar 

  26. Cruz JP, Kaji Y, Yanai N (2018) RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 6:12240–12251

    Article  Google Scholar 

  27. Yogesh PR (2020) Formal verification of secure evidence collection protocol using BAN logic and AVISPA. Procedia Computer Science 167:1334–1344

    Article  Google Scholar 

  28. Patil RY, Patil YH (2022) Identity-based signcryption scheme for medical cyber physical system in standard model. Int J Inf Technol 14(5):2275–2283

    Google Scholar 

  29. Patil RY, Devane SR (2022) Network forensic investigation protocol to identify true origin of cyber crime. Journal of King Saud University-Computer and Information Sciences 34(5):2031–2044

    Article  Google Scholar 

  30. Team TA (2006). Avispa v1. 1 user manual. Information society technologies programme (June 2006), http://www.avispa-project. org, 62, p.112.

  31. Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155:61–86

    Article  Google Scholar 

  32. Patil RY, Patil YH (2023) A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment. Int J Comput Sci Eng 26(2):118–128

    Google Scholar 

  33. Patil RY, Patil YH, Kachhoria R, Lonare S (2022) A provably secure data sharing scheme for smart gas distribution grid using fog computing. Int J Inf Technol 14(6):2927–2939

    Google Scholar 

  34. Srikanth GU, Geetha R, Prabhu S (2023) An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. Int J Inf Technol 15(3):1221–1230

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rachana Y. Patil.

Ethics declarations

Conflict of interest

This research has no any declarations of interest to be disclosed.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bannore, A., Patil, R.Y., H.Patil, Y. et al. Proxy signature-based role delegation scheme: formal analysis and simulation. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01925-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41870-024-01925-8

Keywords

Navigation