The notion of security for probabilistic cryptosystems
SIAM Journal on Computing - Special issue on cryptography
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Secure delegation-by-warrant ID-based proxy signcryption scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
In this paper, a new proxy signcryption scheme is proposed suitable for use by resource constrained devices such as pagers and mobile phones. The proposed scheme is based on delegating the signing rights of the original signer to one of his proxies using warrants. The use of warrants enables explicit specification of the signing rights of the proxy agent. The proxy agent and the original signer are assumed to be registered within the same traditional public key infrastructure. To offer a higher level of security, the proxy key is derived from the personal key of the proxy signer to prevent the proxy signer from denying a signature it created and protects it from framing attacks mounted by the original signer against it. We also consider a variant of our main scheme that works over elliptic curves since they have proven recently the possibility of reducing the key sizes.