Advertisement

Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations

  • So-Young Park
  • Sang-Ho Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3597)

Abstract

Because the Internet is vast and insecure, strong cryptographic protocols are required to support secure communication. In this paper, we propose an efficient way to perform secure delegations in a hierarchical group. We propose a practical multi-proxy signature scheme applicable to hierarchial organization using the Diffie-Hellman problem and secret sharing without secure channels. In addition, we improve the proposed scheme to a dynamic one allowing repeated delegations.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Desmedt, Y.: Threshold Cryptography. European Trans. on Telecommunications and Related Technologies 5(4), 35–43 (1994)MathSciNetGoogle Scholar
  2. 2.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Information Theory IT-22(6), 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Hwang, S., Shi, C.: A Simple Multi-proxy Signature Scheme. In: Proceeding of the Tenth National Conference on Information Security, Hualien, Taiwan, pp. 134–138 (2000)Google Scholar
  4. 4.
    Lal, S., Awasthi, A.: A New Multi-proxy Signature Scheme for Partial Delegation with Warrant, http://www.gfcr.org/ecryp/old/multi.pdf
  5. 5.
    Lin, C., Wu, T., Hwang, J.: Multi-proxy Signature Schemes for Partial Delegation with Cheater Identification. In: Proceeding of IWAP 2002 (2002)Google Scholar
  6. 6.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Message. IEICE Trans. on Fundamentals E79-A(9), 1338–1353 (1996)Google Scholar
  7. 7.
    Micali, S., Ohta, K., Reyzin, L.: Accountable-Subgroup Multisignatures. In: Proceeding of ACM Conference on Computer and Communications Security, pp. 245–254 (2001)Google Scholar
  8. 8.
    Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Xue, Q., Cao, Z.: Improved of Multi-proxy Signature Scheme. In: Proceeding of International Symposium on Communications and Information Technologies (ISCIT), pp. 450–455 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • So-Young Park
    • 1
  • Sang-Ho Lee
    • 1
  1. 1.Dept. of Computer Science and EngineeringEwha Womans UniversitySeoulKorea

Personalised recommendations