Skip to main content

An Analysis of Proxy Signatures: Is a Secure Channel Necessary?

  • Conference paper
  • First Online:
Book cover Topics in Cryptology — CT-RSA 2003 (CT-RSA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2612))

Included in the following conference series:

Abstract

A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Javier Herranz and German Saez “Fully Distributed Proxy Signature Schemes”, http://eprint.iacr.org/, 2002.

  2. S. Kim, S. Park, and D. Won, “Proxy signatures, revisited”, In Pro. of ICICS’97, International Conference in Information and Communications Security, Springer, Lecture Notes in Computer Science, LNCS1334, pages 223–232, 1997. 68, 69, 72

    Google Scholar 

  3. Byoungcheon Lee, Heesun Kim, Kwangjo Kim, “Strong Proxy Signature and its Applications”, SCIS2001, vol 2/2 pp 603–608, Jan.23 26, 2001. 68, 69, 72, 75, 76

    Google Scholar 

  4. Byoungcheon Lee, Heesun Kim, and Kwangjo Kim “Secure Mobile Agent using Strong Non-designated Proxy Signature”, Proc. of ACISP2001, LNCS, Springer Verlag Vol.2119, pp.474–486, 2001.

    Google Scholar 

  5. M. Mambo, K. Usuda, and E. Okamoto, “roxy signature: Delegation of the power o sign messages”, In IEICE Trans. Fundamentals, Vol. E79–A, No. 9, Sep., pp. 1338–1353, 1996. 68, 69, 70, 76

    Google Scholar 

  6. Takeshi Okamoto, Mitsuru Tada, and Eiji Okamoto, “Extended Proxy Signatures for Smart Cards”, In Pro. of ISW’99 Springer, Lecture Notes in Computer Science, LNCS 1729, pp. 247–258, 1999. 69, 76

    Google Scholar 

  7. H. Petersen and P. Horster, “Self-certified keys-Concepts and Applications”, In Proc. Communications and Multimedia Security’97, pages 102–116, Chapman and Hall, 1997. 69, 71

    Google Scholar 

  8. D. Pointcheval and J. Stern, “Security proofs for signatures”, In Advances in Cryptoloy: Eurocrypt’96, pages 387–398, Springer, 1996. 74, 78

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, JY., Cheon, J.H., Kim, S. (2003). An Analysis of Proxy Signatures: Is a Secure Channel Necessary?. In: Joye, M. (eds) Topics in Cryptology — CT-RSA 2003. CT-RSA 2003. Lecture Notes in Computer Science, vol 2612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36563-X_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-36563-X_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00847-7

  • Online ISBN: 978-3-540-36563-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics