skip to main content
article

The security of a strong proxy signature scheme with proxy signer privacy protection

Published: 01 February 2005 Publication History

Abstract

In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. constructed a strong non-designated proxy signature scheme. In 2002, Shum and Wei presented an enhancement to the Lee et al.'s scheme to hide the identity of the proxy signer. No one can determine the identity of the proxy signer only from the proxy signature. Moreover, a trusted authority can reveal the proxy signer's identity if needed. However, this paper will show that the Shum-Wei scheme cannot keep the property of the strong unforgeability. That is, not only the proxy signer but also the original signer can generate valid proxy signatures.

References

[1]
Mambo, M., Usuda, K. and Okamoto, E., Proxy signature: delegation of the power to sign the message. IEICE Trans. Fundamentals. vE79-A i9. 1338-1353.
[2]
B. Lee, H. Kim, K. Kim, Strong proxy signature and its application, in: Proceedings of SCIS 2001, 2001, pp. 603-608
[3]
K. Shum, V.K. Wei, A strong proxy signature scheme with proxy signer privacy protection, in: Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises 2002 (WETICE'02), 2002, Pittsburgh, PA, pp. 55-56

Cited By

View all
  1. The security of a strong proxy signature scheme with proxy signer privacy protection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Applied Mathematics and Computation
    Applied Mathematics and Computation  Volume 161, Issue 3
    February, 2005
    340 pages

    Publisher

    Elsevier Science Inc.

    United States

    Publication History

    Published: 01 February 2005

    Author Tags

    1. Cryptography
    2. Digital signature
    3. Privacy protection
    4. Proxy signature
    5. Security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media