A Secure e-Governance Model Using Role-Based Delegation

  • Aparna BannoreEmail author
  • Satish Devane
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 797)


E-governance services are widespread with the Digital India drive. These services allow the confidential documents of citizens being stored with government in secured manner. Authorized users are allowed to access these documents. Currently, digital signatures are used as a means of authentication. For the purpose of improving the efficiency and transparency of the e-governance system, the task delegation can be performed. We propose the novel method of role delegation by using proxy signature scheme in forward secure manner. The proposed method is designed using elliptic curve cryptosystem (ECC) to make it suitable for portable devices.


Proxy signature Forward secrecy Elliptic curve cryptography 


  1. 1.
    Department of Administrative Reforms & Public Grievances Ministry of Personal Public Grievances Government of India, 2011, The e-Office Framework: A Way Forward for the Government. 2011.
  2. 2.
    Mambo M, Usuda K, Okamoto E (1996) Proxy signature: delegation of the power to sign messages. IEICE Trans Fundam E79-A:1338–1354Google Scholar
  3. 3.
    Fazlagic S, Behlilovic N (2012) Controlled delegation of signature in workflow systems. In: 20th Telecommunications Forum (TELFOR), 2012. IEEE, New York, pp 1389–1392Google Scholar
  4. 4.
    Yeh L, Lin Y (2014) A proxy-based authentication and billing scheme with incentive-aware multihop forwarding for vehicular networks. IEEE Trans Intell Transp Syst 15(4):1607–1621 (IEEE )CrossRefGoogle Scholar
  5. 5.
    Zhou X, Su Y, Wei P (2009) Further Study on Proxy Authorization and Its Schemes. In: ICST Institute for computer sciences, social informatics and telecommunications engineering 2009, LNICST, vol 5, pp 1701–1718 (2009)Google Scholar
  6. 6.
    Bo L, Yilin L (2010) A new forward-secure digital signature scheme based on elliptic curve. In: 2nd International conference on industrial and information systems 2010, vol 2. IEEE, New York, pp 152–155Google Scholar
  7. 7.
    Department of Electronics and Information Technology Ministry of Communication Information Technology, Oct 2012, e-Pramaan: Framework for e-Authentication. 2012.
  8. 8.
    Das M, Saxena A, Phatak D (2007) Proxy signature scheme with effective revocation using bilinear pairings. Int J Netw Secur 4(3):312–317Google Scholar
  9. 9.
    Sunitha N, Amberker B (2009) Forward-secure proxy signature scheme for multiple proxy signers using DSA with proxy revocation. In: International advance computing conference. IEEE, New York, pp 681–686 (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.SIES Graduate School of TechnologyUniversity of MumbaiMumbaiIndia
  2. 2.Datta Meghe College of EngineeringUniversity of MumbaiMumbaiIndia

Personalised recommendations