An analysis of proxy signatures

Is a secure channel necessary?

Jung Yeun Lee, Jung Hee Cheon, Seung-Joo Kim

Research output: Contribution to journalArticle

86 Citations (Scopus)

Abstract

A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.

Original languageEnglish
Pages (from-to)68-79
Number of pages12
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2612
Publication statusPublished - 2003 Dec 1
Externally publishedYes

Fingerprint

Proxy Signature
Proxy
Necessary
Blind Signature
Signature Scheme
Signed

ASJC Scopus subject areas

  • Biochemistry, Genetics and Molecular Biology(all)
  • Computer Science(all)
  • Theoretical Computer Science

Cite this

@article{4ea226b8cdb14a80b9fc9c1c93700bc0,
title = "An analysis of proxy signatures: Is a secure channel necessary?",
abstract = "A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.",
author = "Lee, {Jung Yeun} and Cheon, {Jung Hee} and Seung-Joo Kim",
year = "2003",
month = "12",
day = "1",
language = "English",
volume = "2612",
pages = "68--79",
journal = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - An analysis of proxy signatures

T2 - Is a secure channel necessary?

AU - Lee, Jung Yeun

AU - Cheon, Jung Hee

AU - Kim, Seung-Joo

PY - 2003/12/1

Y1 - 2003/12/1

N2 - A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.

AB - A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.

UR - http://www.scopus.com/inward/record.url?scp=35248866917&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=35248866917&partnerID=8YFLogxK

M3 - Article

VL - 2612

SP - 68

EP - 79

JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SN - 0302-9743

ER -