An Anonymity-Revoking Proxy Signature Scheme

Article Preview

Abstract:

The revocation of delegated rights and anonymity of proxy signer are essential issues of the proxy signature schemes. Based on the bilinear pairings, an anonymity-revoking proxy signature scheme was proposed. In this scheme, when an original signer found that a proxy signer was malicious or the delegation period was expired, he/she could revoke the malicious proxy signer’s signing capability efficiently through a trusted authority. On the other hand, only the signature from delegation of the original signer could be confirmed by the verifier and the identity of the proxy signer could not be known to the verifier. In appearing of disputation, the verifier could reveal the real identity of the proxy signer with the help of the original signer. This scheme can protect not only the original signer’s benefit but also the proxy signer s privacy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2906-2910

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals, 1996, 79−A (9): 1338−1353.

Google Scholar

[2] Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature. Proc. of ACISP2001, LNCS 2119, Spring-Verlag, 2001, 474-486.

DOI: 10.1007/3-540-47719-5_37

Google Scholar

[3] Huang X Y, Susilo W, Mu Y, et al. Proxy signature without random oracles. Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks. Berlin, German: Springer-Verlag, 2006: 473−484.

DOI: 10.1007/11943952_40

Google Scholar

[4] Yong Yu, Ying Sun, Bo Yang, et al. Multi-proxy signature without random oracles. Chinese Journal of Electronics, 2008, 17(3): 475-480.

Google Scholar

[5] Das M L, Saxena A, Gulati V P. An efficient proxy signature scheme with revocation. International Journal Informatica, 2004, 15(4): 455−464

DOI: 10.15388/informatica.2004.072

Google Scholar

[6] Lu E J L, Hwang M S, Huang C J. A new proxy signature scheme with revocation. Applied Mathematics and Computation, 2005, 161(3): 799−806.

DOI: 10.1016/j.amc.2003.12.039

Google Scholar

[7] Yong Yu, Bo Yang, Ying Sun, et al. Proxy signature scheme with fast revocation, Journal of Xidian University, 2007, 34(4): 638−641.

Google Scholar

[8] Lize Gu, Zhongxian Li, Yixian Yang. A anonymous proxy signature scheme without a trusted party, Journal of Beijing University of Posts and Telecommunications, 2005, 28(1):48-50.

Google Scholar

[9] Xiaoming Wang, Fangwei Fu. An anonymity-revoking blind proxy signature scheme, Chinese Journal of Computers, 2003, 26(1):51-54.

Google Scholar

[10] XiaoTong Fu, Lizhen Yang, Guozhen Xiao. Remarks on an anonymity-revoking blind proxy signature scheme, Chinese Journal of Computers, 2005, 28(8):1404-1407.

DOI: 10.1109/cec-east.2004.7

Google Scholar

[11] Pengcheng Zhang, Chuankun Wu. Cryptanalysis of an anonymity-revoking blind proxy signature scheme, Journal of the Graduate School of the Chinese Academy of Sciences, 2006, 23(6): 833-836.

Google Scholar

[12] Zhenhua Liu, Yupu Hu, Xiangsong Zhang, et al. Secure Proxy Signature Scheme with Fast Revocation in the Standard Model. The Journal of China Universities of Posts and Telecommunications, 2009, 16(4): 116-124.

DOI: 10.1016/s1005-8885(08)60258-7

Google Scholar