• DocumentCode
    411602
  • Title

    A new proxy signature scheme based on dual complexities

  • Author

    Chen, Jonathan Jen-Rong ; Sun, Pin-Tai ; Lin, Chih-Lin

  • Author_Institution
    Dept. of Inf. Manage., Van Nung Inst. of Technol., Tao-Yuan, Taiwan
  • fYear
    2003
  • fDate
    14-16 Oct. 2003
  • Firstpage
    268
  • Lastpage
    272
  • Abstract
    The vogue of Internet, makes the changes of the people´ s style. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. MAMBO, USUDA, and OKAMOTO are the pioneers in the research of proxy signature and brings digital signature into a new direction. The original signer can authorize the proxy signers to act as agent via proxy signature scheme without leaking his/her private key. Most of the proposed scheme usually emphasize on the factuality of proxy signature. Some researchers take warrants to enhance the security of proxy signature scheme. The agent may sign many times after one legal authorization until the origin signer changed his/her password or grant periods. The others may need a secure channel to transmit parameters and it decrease practicability. This paper proposes a new proxy signature scheme that can set the grant period without using a warrant or a secure channel. Our scheme is based on the complexity of the discrete logarithm. We also make use of Denning´s time stamp technology to solve the problem of the illegal using of proxy signature by illegal user.
  • Keywords
    Internet; authorisation; certification; computational complexity; message authentication; Denning time stamp technology; Internet; authorization; digital certification; discrete logarithm complexity; information security; proxy signature scheme; Authorization; Certification; Computer networks; Digital signatures; Information management; Information security; Internet; Law; Legal factors; Technology management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on
  • Print_ISBN
    0-7803-7882-2
  • Type

    conf

  • DOI
    10.1109/CCST.2003.1297571
  • Filename
    1297571