Abstract
Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation. Proxy signatures for partial delegation with warrant combines the benefit of Mambo's partial delegation and Neuman's delegation by warrant, and then in threshold delegation the proxy signer's power to sign messages is shared. Moreover, we also propose straightforward and concrete proxy signature schemes satisfying our conditions.
Preview
Unable to display preview. Download preview PDF.
References
M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages,” IEICE Trans. Fundamentals, vol.E79-A, no.9, 1996, pp. 1338–1354
M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. Third ACM Conf. on Computer and Communications Security, 1996, pp.48–57
K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Trans. Fundamentals, vol.E79-A, no.1, 1996, pp.94–101
V. Varadharajan, P. Allen, and S. Black, “An analysis of the proxy problem in distributed systems,” Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp.255–275
B.C. Neuman, “Proxy-based authorization and accounting for distributed systems,” Proc. 13th International Conference on Distributed Computing Systems, 1993, pp.283–291
T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol.IT-31, no.4, 1985, pp.469–472
B.S. Kaliski, “A response to DSS,” Nov. 1991.
C.P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol.4, no.3, 1991, pp.161–174
T. Okamoto, “Provably secure and practical identification schemes and corresponding signature schemes,” Proc. Crypto'92, Lecture Notes in Computer Science, LNCS 740, Springer-Verlag, 1993, pp.31–53
M. Cerecedo, T. Matsumoto, and H. Imai, “Efficient and secure multiparty generation of digital signatures based on discrete logarithms,” IEICE Trans. Fundamentals, vol.E76-A, no.4, 1993, p.532–545.
T.P. Pedersen, “A threshold cryptosystem without a trusted party,” Proc. Eurocrypt'91, Lecture Notes in Computer Science, LNCS 547, Springer-Verlag, 1991, pp.522–526
T.P. Pedersen, “Distributed provers with applications to undeniable signatures,” Proc. Eurocrypt'91, Lecture Notes in Computer Science, LNCS 547, Springer-Verlag, 1991, pp.221–238
A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11, 1979, pp.612–613
Y. Desmedt and Y. F rankel, “Shared generation of authenticators and signatures” Proc. Crypto'91, Lecture Notes in Computer Science, LNCS 576, Springer-Verlag, 1991, pp.457–469
C. Park and K. Kurosawa, “New EIGamal type threshold digital signature scheme,” MICE Trans. Fundamentals, vol.E79-A, no.1, 1996, pp.86–93.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Kim, S., Park, S., Won, D. (1997). Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028478
Download citation
DOI: https://doi.org/10.1007/BFb0028478
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive