Font Size: a A A

Research On Some Proxy Signatures For Special Use

Posted on:2007-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:S J LiFull Text:PDF
GTID:2178360185976836Subject:Operational Research and Cybernetics
Abstract/Summary:PDF Full Text Request
Mambo, Usuda, and Okamoto first introduced the concept of proxy signature in 1996[2]. In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designed person or group, who is called the proxy signer and can sign messages on behalf of the original signer. Proxy signature schemes find applications in a variety of computing environments such as mobile communication, mobile agents, electronic commerce, electronic voting, electronic auction etc.Combined with some other digital signature schemes, in this paper, some proxy signature schemes with special properties are studied. The main contributions are as follows.1. ID-based proxy blind signature scheme. In a proxy signature, an original signer can delegate his signing power to a proxy signer who can sign a message on behalf of the original signer. A blind signature has a salient feature that the signer cannot make a linkage between the blind signature and the identity of the requester. In this scheme, based on bilinear paring and an ID-based signature scheme, an ID-based proxy blind signature scheme is presented, which satisfies the security properties of both proxy signature schemes and blind signature schemes. A simple security analysis of the newly proposed scheme is also given.2. A new multi-proxy signature from bilinear pairings. The new scheme is constructed from bilinear pairings using BLS short signatures. Compared to other schemes, this scheme is not only efficient, but also satisfies all the security requirements of the strong proxy signature. At the same time, the interactive information can be transferred in the public channel.3. An efficient designated-verifier proxy signature scheme. In a proxy signature, an original signer can delegate his signing power to a proxy signer who signs a message on behalf of the original signer. In a designated-verifier signature the verifier is restrictive. Using the Schnorr signature scheme based on DLP, a designated-verifier proxy signature scheme is presented. The new scheme satisfies the security properties of both proxy signature schemes and designated-verifier signature schemes. Analysis also shows that the new scheme is not only secure, but also...
Keywords/Search Tags:digital signature, proxy signature, bilinear pairing, ID-based cryptography, multi-proxy signature, designated verified signature, BLS short signature
PDF Full Text Request
Related items