Proxy Signature Scheme based on Proxy-Register Protocol


The KIPS Transactions:PartC, Vol. 11, No. 1, pp. 1-10, Feb. 2004
10.3745/KIPSTC.2004.11.1.1,   PDF Download:

Abstract

Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signatures are signature schemes that an original signer delegates his signing capability to a proxy signer, and the proxy signer creates a signature on behalf of the original signer. Proxy signatures are fundamentally accomplished by the process that original signer creates the signature about the proxy information and transmits to the proxy signer for using by the proxy key. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In out scheme, verifier verifiles the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. At the same time, all security requirements that were mentioned in previous schemes are satisfied. We also show the advantages of our suggestion by comparing with the previous proxy signature schemes.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
P. S. Jun and O. H. Seog, "Proxy Signature Scheme based on Proxy-Register Protocol," The KIPS Transactions:PartC, vol. 11, no. 1, pp. 1-10, 2004. DOI: 10.3745/KIPSTC.2004.11.1.1.

[ACM Style]
Park Se Jun and O Hae Seog. 2004. Proxy Signature Scheme based on Proxy-Register Protocol. The KIPS Transactions:PartC, 11, 1, (2004), 1-10. DOI: 10.3745/KIPSTC.2004.11.1.1.