Skip to main content
Log in

A formal model for the security of proxy signature schemes

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean for a proxy signature scheme to be secure. Then, we present an example of proxy signature scheme that can be proven secure in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation.3rd ACM Conference on Computer and Communications Security (CCS' 96). New York: ACM Press, 1996, 48–57.

    Google Scholar 

  2. Sun H M. Design of Time-Stamped Proxy Signatures with Traceable Receivers.IEE Proc-Computers & Digital Techniques, 2000,147 (6): 462–466.

    Article  Google Scholar 

  3. Sun H M. Threshold Proxy Signatures.IEE Proc Computers & Digital Techniques 1999,146 (5): 259–263.

    Article  Google Scholar 

  4. Lee B, Kim H, Kim K. Strong Proxy Signature and its Applications.Proc of the 2001 Symposium on Cryptography and Information Security (SCIS'01), Vol 2. Oiso, Japan Jan, 2001, 603–608.http://caislab. icu. ac.kr/~sultan/publication/pub.html.

  5. Sun H M, Hsieh B T. On the Security of Some Proxy Signature Schemes.Cryptology ePrint Archive, Roport 2003/ 068.http://eprint.iacr.org/2003/068, Apr 2003.

  6. Bellare M, Rogaway P. Optimal Asymmetric Encryptpion-How to Encrypt with RSA.Eurocrypt' 94 LNCS 950. Berlin: Springer-Verlag, 1995, 92–111.

    Google Scholar 

  7. Goldwasser S, Micali S, Rivest R. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks.SIAM Journal of Computing, 1988,17 (2): 281–308.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhu Yue-fei.

Additional information

Foundation item: Supported by the National Key Basic Research and Development Program (973 Program G1999035804), the National Natural Science Foundation of China (9020415, 60473021) and the Elitist Youth Foundation of Henan Province (021201400)

Biography: GU Chun-xiang(1976-), male, Ph. D candidate, research direction; network security and information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chun-xiang, G., Yue-fei, Z. & Ya-juan, Z. A formal model for the security of proxy signature schemes. Wuhan Univ. J. Nat. Sci. 10, 275–278 (2005). https://doi.org/10.1007/BF02828668

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828668

Key words

CLC number

Navigation