An Efficient Proxy-Protected Signature Scheme Based on Factoring

  • Yuan Zhou
  • Zhenfu Cao
  • Zhenchuan Chai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)


Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, most of previously proposed schemes in these literatures are based on discrete logarithm problems. To our best knowledge, there still doesn’t exist an indeed proxy signature scheme based on factoring. The paper present a new proxy signature scheme based on factoring, along with a complete proof of security in the Random Oracle model. The proposed scheme does not need a secure channel to transmit proxy private key.


Original Signer Signature Scheme Security Parameter Proxy Signature Secure Channel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), New Delhi, India, pp. 48–57 (1996)Google Scholar
  2. 2.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)Google Scholar
  3. 3.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights,
  4. 4.
    Kim, H., Baek, J., Lee, B., Kim, K.: Secret Computation with secrets for mobile agent using one-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (2001)Google Scholar
  5. 5.
    Wang, H.X., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507–522. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signatures. IEE Proc-Comput. Digit. Tech. 146(5), 259–263 (1999)CrossRefGoogle Scholar
  7. 7.
    Zhang, K.: Threshold proxy signature schemes. In: 1997 Information Security Workshop, Japan, pp. 191–197 (September 1997)Google Scholar
  8. 8.
    Kim, S., Park, S., Won, D.: Proxy signatures, revised. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  9. 9.
    Yi, L., Bai, G., Xiao, G.: A new type of proxy signature scheme. Electronic Letters 36(6), 527–528 (2000)CrossRefGoogle Scholar
  10. 10.
    Shao, Z.: Proxy signature schemes based on factoring. Information Processing Letter 85(3), 137–143 (2003)zbMATHCrossRefGoogle Scholar
  11. 11.
    Ballare, M., Rogaway, P.: Random oracles are practical: a paradiam for designing efficient protocols. In: First ACM Conference on Computer and Communication Security. ACM, New York (1993)Google Scholar
  12. 12.
    Rabin, M.O.: Digitalized signatures. In: Foundations of Secure Communication, pp. 155–168. Academic Press, London (1978)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yuan Zhou
    • 1
  • Zhenfu Cao
    • 1
  • Zhenchuan Chai
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiP. R. China

Personalised recommendations