A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Proxy signature schemes based on factoring
Information Processing Letters
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Provably secure multi-proxy signature scheme with revocation in the standard model
Computer Communications
A mediated proxy signature scheme with fast revocation for electronic transactions
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose two proxy signature schemes based on RSA cryptosystems. The proposed first scheme does not consider proxy revocation mechanism; however, it will help us to compare our protocol with the existing RSA-based schemes. The proposed second scheme provides an effective proxy revocation mechanism. The proposed schemes do not require any secure channel to proxy key delivery and support the necessary security requirements of proxy signature.