Abstract
In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of digital signature found their importance in e-governance and finance domain for authority delegation. Role based delegation proposed in this research work is aimed for providing in roles rights in the signature form to the individual in the terms of proxy signature. Various proxy signature delegation schemes are studied and compared on the parameter’s security, efficiency and key management majorly. Forward secure proxy key generation and verification scheme Ro-De-PSA is proposed based on Elliptic curve cryptography (ECC). The correctness of the proposed algorithm is analysed using BAN logic and the security analysis is performed using AVISPA.
Similar content being viewed by others
Data Availability
Not applicable.
References
Aggarwal S, Kumar N (2021) Digital signatures. Advances in Computers, vol 121. Elsevier, pp 95–107
Finandhita A, Afrianto I (2018) Development of e-diploma system model with digital signature authentication. IOP Conference Series: Materials Science and Engineering, vol 407. IOP Publishing, p 012109
Bannore A, Patil RY, Devane SR (2022) An efficient proxy signature–based authority delegation scheme for medical cyber physical systems. Cyber Security Threats and Challenges Facing Human Life. Chapman and Hall/CRC, pp 13–23
Patil RY, Bannore A (2022). Provably secure role delegation scheme for medical cyber-physical systems. Security Analytics: A Data Centric Approach to Information Security.
Patil RY (2023). A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. International Journal of Information Technology. 1 11.
Singh T, Kumar M, Gelmecha DJ, Thakur GK, Tyagi V, Sori WJ (2023). A lightweight identity based generalized signcryption scheme for secure communication in standard model. International Journal of Information Technology, 1 9
Ajay D, Devi S (2016) E-Governance status in India. International Journal of Computer
Mittal P, Kaur A (2013) E-Governance-A challenge for India. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(3):1196
Mohammed A, Drew S (2010) Implementation of e-government: advantages and challenges. International Association for Scientific Knowledge (IASK)
Chan CM, Lau Y, Pan SL (2008) E-government implementation: A macro analysis of Singapore’s e-government initiatives. Gov Inf Q 25(2):239–255
Aparna Bannore, Satish Devane , Use of Proxy Signature in e-Governance, in second international conference on Information and communication
Boldyreva A, Palacio A, Warinschi B (2012) Secure proxy signature schemes for delegation of signing rights. J Cryptol 25:57–115
Lee B, Kim H, Kim K (2001). Strong proxy signature and its applications. Proceedings of SCIS 2001 603 608
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: Delegation of the power to sign messages. IEICE Trans Fundam Electron Commun Comput Sci 79(9):1338–1354
Alomair B, Sampigethaya K, Poovendran R (2008) Efficient generic forward-secure signatures and proxy signatures. Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16–17, 2008 Proceedings 5. Springer, Berlin Heidelberg, pp 166–181
He J, Li X, Li L, Tang C (2010) A new forward-secure proxy signature scheme. 2010 International Forum on Information Technology and Applications, vol 2. IEEE, pp 30–33
Chang MH, Lin TS, Yeh YS (2003) Forward secure proxy signature scheme
Bannore A, Devane S (2018) ECC based proxy signature scheme with forward security. Smart Secure Systems–IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings 2. Springer, Singapore, pp 126–138
Schröder D, Unruh D (2012) Security of blind signatures revisited. International Workshop on Public Key Cryptography. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 662–679
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13:361–396
Chaum D, Van Heyst E (1991) Group signatures. Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings 10. Springer, Berlin Heidelberg, pp 257–265
Bellare M, Shi H, Zhang C (2005) Foundations of group signatures: The case of dynamic groups. Cryptographers’ track at the RSA conference. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 136–153
Camenisch J, Groth J (2004) Group signatures: Better efficiency and new theoretical aspects. International Conference on Security in Communication Networks. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 120–133
Fazlagic S, Behlilovic N (2012) Controlled delegation of signature in workflow systems. 20th Telecommunications Forum (TELFOR), 2012. IEEE, pp 1389–1392
Ali A, Habiba U, Shibli MA (2015) Taxonomy of delegation model. Information Technology-New Generations (ITNG), 2015 12th International Conference on. IEEE, pp 218–223
Cruz JP, Kaji Y, Yanai N (2018) RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 6:12240–12251
Yogesh PR (2020) Formal verification of secure evidence collection protocol using BAN logic and AVISPA. Procedia Computer Science 167:1334–1344
Patil RY, Patil YH (2022) Identity-based signcryption scheme for medical cyber physical system in standard model. Int J Inf Technol 14(5):2275–2283
Patil RY, Devane SR (2022) Network forensic investigation protocol to identify true origin of cyber crime. Journal of King Saud University-Computer and Information Sciences 34(5):2031–2044
Team TA (2006). Avispa v1. 1 user manual. Information society technologies programme (June 2006), http://www.avispa-project. org, 62, p.112.
Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155:61–86
Patil RY, Patil YH (2023) A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment. Int J Comput Sci Eng 26(2):118–128
Patil RY, Patil YH, Kachhoria R, Lonare S (2022) A provably secure data sharing scheme for smart gas distribution grid using fog computing. Int J Inf Technol 14(6):2927–2939
Srikanth GU, Geetha R, Prabhu S (2023) An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. Int J Inf Technol 15(3):1221–1230
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
This research has no any declarations of interest to be disclosed.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bannore, A., Patil, R.Y., H.Patil, Y. et al. Proxy signature-based role delegation scheme: formal analysis and simulation. Int. j. inf. tecnol. (2024). https://doi.org/10.1007/s41870-024-01925-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41870-024-01925-8