Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper a new type of digital proxy signature is proposed. The proxy signature allows a designated per-son, called a proxy signer, to sign on behalf of an original signer.Classification of the proxy signatures is shown from the point of view of the degree of delegation, and the necessary conditions of a proxy signature are clarified. The proposed proxy signature scheme is based on either the discrete logarithm problem or the problem of taking the square root modulo of a composite number. Compared to the consecutive execution of the ordinary digital signature schemes, it has a direct form, and a verifier does not need a public key of a user other than the original signer in the verification stage. Moreover, it requires less computational work than the consecutive execution of the signature schemes.Due to this efficiency together with the delegation property, an organization, e.g. a software company, can very efficiently create many signatures of its own by delegating its signing power to multiple employees. Another attractive feature is that the proxy signature based on the discrete logarithm problem is highly applicable to other ordinary signature schemes based on the same problem. For instance, designated confirmer proxy signatures can be constructed. As a stronger form of proxy signature for partial delegation, another type of proxy signature scheme is proposed in which even an original signer cannot create a proxy signature.Furthermore, using a proposed on-line proxy updating protocol,the original signer can revoke proxies of dishonest proxy signers.key words: proxy, proxy signature, proxy signer delegation, seal
- 社団法人電子情報通信学会の論文
- 1996-09-25
著者
-
Okamoto E
Institute Of Information Sciences And Electronics University Of Tsukuba
-
Mambo M
Japan Advanced Inst. Sci. And Technol. Ishikawa‐ken Jpn
-
Usuda Keisuke
School Of Inform. Sci. Japan Advanced Institute Of Science And Technology:ntt
-
OKAMOTO Eiji
the School of Information Science, Japan Advanced Institute of Science and Technology
-
Usuda Kazuto
Faculty Of Science And Technology Keio University:(present Address)ntt Communications Corporation
-
Mambo Masahiro
The School Of Information Science Japan Advanced Institute Of Science And Technology
-
USUDA Keisuke
the School of Information Science, Japan Advanced Institute of Science andTechnology
-
Okamoto Eiji
The School Of Information Science Japan Advanced Institute Of Science And Technology
-
Okamoto Eiji
Department Of Computer Science And Engineering Nagoya Institute Of Technology
関連論文
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem (Applications) (Cryptography and Information Security)
- The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
- Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security)
- Permutation Cipher Scheme Using Polynomials over a Field
- A Simple Construction of Codes for Identification via Channels under Average Error Criterion (Special Section on Information Theory and Its Applications)
- Pre-Rake Scheme for UWB-IR System with Guard-Time in Multipath Fading Channel(Wide Band Systems)
- Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
- Anonymous Public Key Certificates and their Applications (Special Section on Cryptography and Information Security)
- The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem(Public Key Cryptography)(Cryptography and Information Security)
- Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent(Discrete Mathematics and Its Applications)
- Proposal for New E-cash System Using Message Recovery Signature (特集 情報セキュリティの理論と応用)
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks : Special Section on Cryptography and Information Security
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
- Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security)
- Application of Wavelet Packet Modulation to Mobile Communication(Wide Band Systems)