An improvement proxysignature scheme by authors J.-Y. Lee, J.-H. Cheon and S. Kim is proposed. Under thisimprovement, the scheme does not allow parties to create proxy private key independently.A group proxy signature scheme is suggested too. It can be used for the implementation ofvoting procedures.
Download file
Counter downloads: 102
- Title Some proxy signature protocols
- Headline Some proxy signature protocols
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 1(11)
- Date:
- DOI
Keywords
voting, group signature, security analysis, digital signatures, proxy signatures, голосование, коллективная подпись, анализ безопасности, доверенная цифровая подпись, электронная цифровая подписьAuthors
References
Lee B., Kim H., and Kim K. Strong proxy signature and its applications // Proc. of the 2001 Symposium on Cryptography and Information Security (SCIS'01), Oiso, Japan, Jan. 23-26, 2001. V. 2/2. P. 603-608.
Lee J.-Y., Cheon J.-H., and KimS. An analysis of proxy signatures: Is a secure channel necessary? // LNCS. 2003. V.2612. P. 68-79.
Wang G., Bao F., Zhou J., and Deng R. H. Security Analysis of Some Proxy Signatures // LNCS. 2004. V. 2971. P. 305-319.
KimS., ParkS., and Won D Proxy signatures, revisited // Information and Communications Security (ICICS'97). 1997. LNCS. V. 1334, P.223-232.
Mambo M., Usuda K., and Okamoto E. Proxy signatures for delegating signing operation // Proc. of 3rd ACM Conference on Computer and Communications Security (CCS'96). ACM Press, 1996. P. 48-57.
Mambo M., Usuda K., and Okamoto E. Proxy signatures: Delegation of the power to sign messages // IEICE Trans. Fundamentals. 1996. V.E79-A. No. 9. P. 1338-1353.

Some proxy signature protocols | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2011. № 1(11).
Download full-text version
Download fileCounter downloads: 198