Abstract
Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, most of previously proposed schemes in these literatures are based on discrete logarithm problems. To our best knowledge, there still doesn’t exist an indeed proxy signature scheme based on factoring. The paper present a new proxy signature scheme based on factoring, along with a complete proof of security in the Random Oracle model. The proposed scheme does not need a secure channel to transmit proxy private key.
This research is partially supported by the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No. 60225007, the National Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20020248024 and Grant-in-Aid for Scientific Research (C) under Grant No. 14540100.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), New Delhi, India, pp. 48–57 (1996)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights, http://venona.antioffline.com/2003/096.pdf
Kim, H., Baek, J., Lee, B., Kim, K.: Secret Computation with secrets for mobile agent using one-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (2001)
Wang, H.X., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507–522. Springer, Heidelberg (2003)
Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signatures. IEE Proc-Comput. Digit. Tech. 146(5), 259–263 (1999)
Zhang, K.: Threshold proxy signature schemes. In: 1997 Information Security Workshop, Japan, pp. 191–197 (September 1997)
Kim, S., Park, S., Won, D.: Proxy signatures, revised. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Yi, L., Bai, G., Xiao, G.: A new type of proxy signature scheme. Electronic Letters 36(6), 527–528 (2000)
Shao, Z.: Proxy signature schemes based on factoring. Information Processing Letter 85(3), 137–143 (2003)
Ballare, M., Rogaway, P.: Random oracles are practical: a paradiam for designing efficient protocols. In: First ACM Conference on Computer and Communication Security. ACM, New York (1993)
Rabin, M.O.: Digitalized signatures. In: Foundations of Secure Communication, pp. 155–168. Academic Press, London (1978)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, Y., Cao, Z., Chai, Z. (2005). An Efficient Proxy-Protected Signature Scheme Based on Factoring. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. ISPA 2005. Lecture Notes in Computer Science, vol 3759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576259_37
Download citation
DOI: https://doi.org/10.1007/11576259_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29770-3
Online ISBN: 978-3-540-32115-6
eBook Packages: Computer ScienceComputer Science (R0)