Secure Proxy Signature Based on Factoring and Discrete Logarithm
A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1339382Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 705
 M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
 S. Kim, S. Park and D. Won, “Proxy signatures”, In: ICICS97, LNCS 1334, Springer-Verlag, (1997), pp. 223-232.
 T. Okamoto, M. Tada and E. Okamoto, “Extended proxy signatures for smart card”, In: Proceedings of Information Security Workshop 99, LNCS 1729, Springer-Verlag, (1999), pp. 247-258.
 B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
 B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608.
 K. Shum and V. K. Wei, “A strong proxy signature scheme with proxy signer privacy protection”, In: Proceedings of IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE02), (2002).
 Z. Shao, “Proxy signature schemes based on factoring”, Inform Process Lett., no. 85, (2003), pp. 137 143.
 Y. Zhou, Z. Cao and R. Lu, “Provably secure proxy-protected signature schemes based on factoring”, Appl Math Comput., vol. 164, no. 1, (2005), pp. 83-98
 S.Han, E. Chang, J.Wang, W.Liu, A New Proxy Signature Scheme As Secure As Elgamal Signature, World Academy of Science, Engineering and Technology, 11(2005), 27-31.
 T. Elgamal, A Public Key Cryptosystem and Signature Scheme Based On Discrete Logarithms, IEEE Trans. Information Theory, 1985, 469-472..
 L. Li, S. Tzeng, M. Hwang, Improvement of signature based on factoring and discrete logarithms, Applied Mathematics and Computation, 161(2005), 49-54.
 L. Harn, Public Key Cryptosystem Design Based on Factoring and Discrete logarithms, ZEE Proceeding Computer Digit Tech 141(3), 193-195.
 M. Mat-Isa, E. S. Ismail,” A new proxy signature with revocation based on factoring and discrete logarithm “, Applied Mathematical Sciences, Vol. 7, 2013, no. 123, 6141-6152 .
 W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-l 22, no. 6, PP. 644-654, November, 1976.
 K. Chalkias, F. Mpaldimtsi, D. H. Varsakelis, and G. Stephanides, “On the Key-compromise impersonation vulnerability of one-pass key establishment protocols,” in Proc. International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, July 28-31, 2007.
 Swati Verma and Birendra Kumar Sharma,” An Efficient Proxy Signature Scheme Based On RSA Cryptosystem,” International Journal of Advanced Science and Technology Vol. 51, February, 2013,pp.121-126.
 H. Elkamchouchi, M. R. M. Rizk, and Fatma Ahmed,” A New Secure Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 5, No. 2, April 2013, pp.245.