Proxy signatures secure against proxy key exposure

  • Authors:
  • Jacob C. N. Schuldt;Kanta Matsuura;Kenneth G. Paterson

  • Affiliations:
  • Institute of Industrial Science, University of Tokyo, Tokyo, Japan;Institute of Industrial Science, University of Tokyo, Tokyo, Japan;Information Security Group, Royal Holloway, University of London, Egham, Surrey, UK

  • Venue:
  • PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential aggregate signatures; our construction provides a benchmark by which future specific constructions may be judged. Finally, we consider the extension of our model and constructions to the identity-based setting.