Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms

Publication Type:

Journal Article

Source:

Information & Security: An International Journal, Volume 12, Issue 2, p.250-258 (2003)

Keywords:

certification authority, digital signature, proxy signature, time stamp authority

Abstract:

A proxy signature allows a designated person, called a proxy signer, to sign a message on behalf of an original signer. Many proxy signature-related schemes have been proposed due to the fact that this type of scheme is very important. However, these new schemes always face security challenges. To minimize security challenges, the objective of the authors of this paper is to construct a proxy signature scheme that combines existing security mechanisms, rather than attempting to invent a new scheme. They believe that the proposed proxy signature scheme not only satisfies the essential properties mentioned in Mambo-Usuda-Okamoto’s proxy signature scheme but also has additional advantages, such as non-repudiation and prevention of delegation transfer. Furthermore, the fewer security challenges and easy implementation are direct benefits obtained from using the existing mechanisms

Share/Save
Last updated: Wednesday, 13 February 2019