Commenced in January 2007
Paper Count: 31108
An Efficient Proxy Signature Scheme Over a Secure Communications Network
Abstract:Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1339372Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 799
 M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
 S. Kim, S. Park and D. Won, “Proxy signatures”, In: ICICS97, LNCS 1334, Springer-Verlag, (1997), pp. 223-232.
 T. Okamoto, M. Tada and E. Okamoto, “Extended proxy signatures for smart card”, In: Proceedings of Information Security Workshop 99, LNCS 1729, Springer-Verlag, (1999), pp. 247-258.
 B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
 B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608
 Hwang S., Chen C.: A new proxy multi- signature scheme, International workshop on cryptology and network security, Tamkang University Taipei, Taiwan, pp 26–28 (2001).
 Constantin Popescu: A Secure Proxy Signature Scheme with Delegation by Warrant, SIC: Volume 20, issue 4, pp. 373- 380 (2011).
 W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-l 22, no. 6, PP. 644-654, November, 1976.
 K. Chalkias, F. Mpaldimtsi, D. H. Varsakelis, and G. Stephanides, “On the Key-compromise impersonation vulnerability of one-pass key establishment protocols,” in Proc. International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, July 28-31, 2007.
 Fatma Ahmedand Dalia Elkamchouchi,” A New Efficient Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 2, No. 4, April 2013,pp.510-512.