원문정보
보안공학연구지원센터(IJAST)
International Journal of Advanced Science and Technology
Vol.51
2013.02
pp.121-126
초록
영어
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose proxy signature scheme based on RSA cryptosystem.
Our scheme does not consider proxy revocation mechanism, but it is efficient than the existing RSA-based schemes.
목차
Abstract
1. Introduction
2. Security Requirements of Proxy Signature Scheme
3. Proposed Proxy Signature Scheme
3.1 Initialization
3.2 Proxy Key Generation
3.3 Proxy Key Verification
3.4 Proxy Signature Generation
3.5 Proxy Signature Verification
4. Security Analysis
4.1 Verifiability
4.2 Strong Unforgeability
4.3 Strong Identifiability
4.4 Strong Undeniability
4.5 Prevention of Misuse
5. Performance Analysis
6. Conclusion
Acknowledgements
References
1. Introduction
2. Security Requirements of Proxy Signature Scheme
3. Proposed Proxy Signature Scheme
3.1 Initialization
3.2 Proxy Key Generation
3.3 Proxy Key Verification
3.4 Proxy Signature Generation
3.5 Proxy Signature Verification
4. Security Analysis
4.1 Verifiability
4.2 Strong Unforgeability
4.3 Strong Identifiability
4.4 Strong Undeniability
4.5 Prevention of Misuse
5. Performance Analysis
6. Conclusion
Acknowledgements
References