Abstract
This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an example of proxy signature scheme that can be proven secure in the standard model.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation.3rd ACM Conference on Computer and Communications Security (CCS' 96). New York: ACM Press, 1996, 48–57.
Sun H M. Design of Time-Stamped Proxy Signatures with Traceable Receivers.IEE Proc-Computers & Digital Techniques, 2000,147 (6): 462–466.
Sun H M. Threshold Proxy Signatures.IEE Proc Computers & Digital Techniques 1999,146 (5): 259–263.
Lee B, Kim H, Kim K. Strong Proxy Signature and its Applications.Proc of the 2001 Symposium on Cryptography and Information Security (SCIS'01), Vol 2. Oiso, Japan Jan, 2001, 603–608.http://caislab. icu. ac.kr/~sultan/publication/pub.html.
Sun H M, Hsieh B T. On the Security of Some Proxy Signature Schemes.Cryptology ePrint Archive, Roport 2003/ 068.http://eprint.iacr.org/2003/068, Apr 2003.
Bellare M, Rogaway P. Optimal Asymmetric Encryptpion-How to Encrypt with RSA.Eurocrypt' 94 LNCS 950. Berlin: Springer-Verlag, 1995, 92–111.
Goldwasser S, Micali S, Rivest R. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks.SIAM Journal of Computing, 1988,17 (2): 281–308.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Key Basic Research and Development Program (973 Program G1999035804), the National Natural Science Foundation of China (9020415, 60473021) and the Elitist Youth Foundation of Henan Province (021201400)
Biography: GU Chun-xiang(1976-), male, Ph. D candidate, research direction; network security and information security.
Rights and permissions
About this article
Cite this article
Chun-xiang, G., Yue-fei, Z. & Ya-juan, Z. A formal model for the security of proxy signature schemes. Wuhan Univ. J. Nat. Sci. 10, 275–278 (2005). https://doi.org/10.1007/BF02828668
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02828668