<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wei-Bin Lee</style></author><author><style face="normal" font="default" size="100%">Tzung-Her Chen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">certification authority</style></keyword><keyword><style  face="normal" font="default" size="100%">digital signature</style></keyword><keyword><style  face="normal" font="default" size="100%">proxy signature</style></keyword><keyword><style  face="normal" font="default" size="100%">time stamp authority</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">250-258</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A proxy signature allows a designated person, called a proxy signer, to sign a message on behalf of an original signer. Many proxy signature-related schemes have been proposed due to the fact that this type of scheme is very important. However, these new schemes always face security challenges. To minimize security challenges, the objective of the authors of this paper is to construct a proxy signature scheme that combines existing security mechanisms, rather than attempting to invent a new scheme. They believe that the proposed proxy signature scheme not only satisfies the essential properties mentioned in Mambo-Usuda-Okamoto’s proxy signature scheme but also has additional advantages, such as non-repudiation and prevention of delegation transfer. Furthermore, the fewer security challenges and easy implementation are direct benefits obtained from using the existing mechanisms</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">250</style></section></record></records></xml>