A New Proxy Signature Scheme Providing Self-delegation

  • Younho Lee
  • Heeyoul Kim
  • Yongsu Park
  • Hyunsoo Yoon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4296)


We improve Malkin et al’s construction (Eurocrypt’04) of the proxy signature scheme in the random oracle model. Unlike Malkin et al’s scheme, the proposed scheme does not assume the existence of the trusted secure device, which has a global secret key that all users’ private keys can be recovered with. This makes the proposed scheme more scalable and efficient because users need not access and cooperate with the secure device to generate their public/private key pairs.

We show that the proposed scheme is provably secure based on the modified strong RSA assumption that was made by the Itkis et al (CRYPTO’01).


cryptographic protocol digital signature proxy signature self-delegation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boldyreva, A., Palacio, A., Warinsch, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights. IACR ePrint Archive (2003), Available at:
  2. 2.
    Bellare, M., Rogaway, P.: Random Oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conferences on Computer and Communication Security, November 1993, pp. 62–73 (1993)Google Scholar
  3. 3.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65–82. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong Key-Insulated Signature Schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130–144. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The Digital Distributed Security Architecture. In: Proceedings of National Computer Security Conference (1989)Google Scholar
  6. 6.
    Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Goldreich, O., Pfitzmann, B., Rivest, R.L.: Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 153–168. Springer, Heidelberg (1998)Google Scholar
  8. 8.
    Guillou, L., Quisquater, J.: A paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Itkis, G., Reyzin, L.: Forward-Secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: EUROCRYPT 2004. LNCS, vol. 2332, pp. 306–332. Springer, Heidelberg (2002)Google Scholar
  11. 11.
    Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. IACR ePrint Archive (2004), available at:
  12. 12.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(9), 1338–1354 (1996)Google Scholar
  13. 13.
    Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: Proceedings of 13th International Conference of Distributed Computing Systems, pp. 283–291 (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Younho Lee
    • 1
  • Heeyoul Kim
    • 1
  • Yongsu Park
    • 2
  • Hyunsoo Yoon
    • 1
  1. 1.Network and Security Laboratory, Division of Computer ScienceKorea Advanced Institute of Science and Technology(KAIST) 
  2. 2.College of Information and CommunicationHanyang University 

Personalised recommendations