An Efficient Proxy Signature Scheme Over a Secure Communications Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: Proxy signature, warrant partial delegation, key agreement, discrete logarithm.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1339372

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1264

References:


[1] M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
[2] S. Kim, S. Park and D. Won, “Proxy signatures”, In: ICICS97, LNCS 1334, Springer-Verlag, (1997), pp. 223-232.
[3] T. Okamoto, M. Tada and E. Okamoto, “Extended proxy signatures for smart card”, In: Proceedings of Information Security Workshop 99, LNCS 1729, Springer-Verlag, (1999), pp. 247-258.
[4] B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
[5] B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608
[6] Hwang S., Chen C.: A new proxy multi- signature scheme, International workshop on cryptology and network security, Tamkang University Taipei, Taiwan, pp 26–28 (2001).
[7] Constantin Popescu: A Secure Proxy Signature Scheme with Delegation by Warrant, SIC: Volume 20, issue 4, pp. 373- 380 (2011).
[8] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-l 22, no. 6, PP. 644-654, November, 1976.
[9] K. Chalkias, F. Mpaldimtsi, D. H. Varsakelis, and G. Stephanides, “On the Key-compromise impersonation vulnerability of one-pass key establishment protocols,” in Proc. International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, July 28-31, 2007.
[10] Fatma Ahmedand Dalia Elkamchouchi,” A New Efficient Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 2, No. 4, April 2013,pp.510-512.