Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30998
Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi


A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: key agreement, discrete logarithm, factoring, proxy signature

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 770


[1] M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign the message, IEICE Trans. Fundamentals E79-A (9) (1996) PP. 1338 - 1353.
[2] S. Kim, S. Park and D. Won, “Proxy signatures”, In: ICICS97, LNCS 1334, Springer-Verlag, (1997), pp. 223-232.
[3] T. Okamoto, M. Tada and E. Okamoto, “Extended proxy signatures for smart card”, In: Proceedings of Information Security Workshop 99, LNCS 1729, Springer-Verlag, (1999), pp. 247-258.
[4] B. Lee, H. Kim and K. Kim, “Secure mobile agent using strong non-designated proxy signature”, In: Information security and private (ACISP01), LNCS 2119, Springer-Verlag, (2001), pp. 474-486.
[5] B. Lee, H. Kim and K. Kim, “Strong proxy signature and its applications”, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS01), vol. 2, no. 2, (2001), pp. 603-608.
[6] K. Shum and V. K. Wei, “A strong proxy signature scheme with proxy signer privacy protection”, In: Proceedings of IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE02), (2002).
[7] Z. Shao, “Proxy signature schemes based on factoring”, Inform Process Lett., no. 85, (2003), pp. 137 143.
[8] Y. Zhou, Z. Cao and R. Lu, “Provably secure proxy-protected signature schemes based on factoring”, Appl Math Comput., vol. 164, no. 1, (2005), pp. 83-98
[9] S.Han, E. Chang, J.Wang, W.Liu, A New Proxy Signature Scheme As Secure As Elgamal Signature, World Academy of Science, Engineering and Technology, 11(2005), 27-31.
[10] T. Elgamal, A Public Key Cryptosystem and Signature Scheme Based On Discrete Logarithms, IEEE Trans. Information Theory, 1985, 469-472..
[11] L. Li, S. Tzeng, M. Hwang, Improvement of signature based on factoring and discrete logarithms, Applied Mathematics and Computation, 161(2005), 49-54.
[12] L. Harn, Public Key Cryptosystem Design Based on Factoring and Discrete logarithms, ZEE Proceeding Computer Digit Tech 141(3), 193-195.
[13] M. Mat-Isa, E. S. Ismail,” A new proxy signature with revocation based on factoring and discrete logarithm “, Applied Mathematical Sciences, Vol. 7, 2013, no. 123, 6141-6152 .
[14] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-l 22, no. 6, PP. 644-654, November, 1976.
[15] K. Chalkias, F. Mpaldimtsi, D. H. Varsakelis, and G. Stephanides, “On the Key-compromise impersonation vulnerability of one-pass key establishment protocols,” in Proc. International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain, July 28-31, 2007.
[16] Swati Verma and Birendra Kumar Sharma,” An Efficient Proxy Signature Scheme Based On RSA Cryptosystem,” International Journal of Advanced Science and Technology Vol. 51, February, 2013,pp.121-126.
[17] H. Elkamchouchi, M. R. M. Rizk, and Fatma Ahmed,” A New Secure Protocol for Authenticated Key Agreement,” IACSIT International Journal of Engineering and Technology, Vol. 5, No. 2, April 2013, pp.245.