Skip to main content

Proxy signatures, revisited

  • Session 7: Signatures
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation. Proxy signatures for partial delegation with warrant combines the benefit of Mambo's partial delegation and Neuman's delegation by warrant, and then in threshold delegation the proxy signer's power to sign messages is shared. Moreover, we also propose straightforward and concrete proxy signature schemes satisfying our conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages,” IEICE Trans. Fundamentals, vol.E79-A, no.9, 1996, pp. 1338–1354

    Google Scholar 

  2. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. Third ACM Conf. on Computer and Communications Security, 1996, pp.48–57

    Google Scholar 

  3. K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Trans. Fundamentals, vol.E79-A, no.1, 1996, pp.94–101

    Google Scholar 

  4. V. Varadharajan, P. Allen, and S. Black, “An analysis of the proxy problem in distributed systems,” Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp.255–275

    Google Scholar 

  5. B.C. Neuman, “Proxy-based authorization and accounting for distributed systems,” Proc. 13th International Conference on Distributed Computing Systems, 1993, pp.283–291

    Google Scholar 

  6. T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol.IT-31, no.4, 1985, pp.469–472

    Article  Google Scholar 

  7. B.S. Kaliski, “A response to DSS,” Nov. 1991.

    Google Scholar 

  8. C.P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol.4, no.3, 1991, pp.161–174

    Article  Google Scholar 

  9. T. Okamoto, “Provably secure and practical identification schemes and corresponding signature schemes,” Proc. Crypto'92, Lecture Notes in Computer Science, LNCS 740, Springer-Verlag, 1993, pp.31–53

    Google Scholar 

  10. M. Cerecedo, T. Matsumoto, and H. Imai, “Efficient and secure multiparty generation of digital signatures based on discrete logarithms,” IEICE Trans. Fundamentals, vol.E76-A, no.4, 1993, p.532–545.

    Google Scholar 

  11. T.P. Pedersen, “A threshold cryptosystem without a trusted party,” Proc. Eurocrypt'91, Lecture Notes in Computer Science, LNCS 547, Springer-Verlag, 1991, pp.522–526

    Google Scholar 

  12. T.P. Pedersen, “Distributed provers with applications to undeniable signatures,” Proc. Eurocrypt'91, Lecture Notes in Computer Science, LNCS 547, Springer-Verlag, 1991, pp.221–238

    Google Scholar 

  13. A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, 1979, pp.612–613

    Article  Google Scholar 

  14. Y. Desmedt and Y. F rankel, “Shared generation of authenticators and signatures” Proc. Crypto'91, Lecture Notes in Computer Science, LNCS 576, Springer-Verlag, 1991, pp.457–469

    Google Scholar 

  15. C. Park and K. Kurosawa, “New EIGamal type threshold digital signature scheme,” MICE Trans. Fundamentals, vol.E79-A, no.1, 1996, pp.86–93.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Kim, S., Park, S., Won, D. (1997). Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028478

Download citation

  • DOI: https://doi.org/10.1007/BFb0028478

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics