An analysis of proxy signatures: Is a secure channel necessary?

Jung Yeun Lee, Jung Hee Cheon, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingChapter

87 Citations (Scopus)

Abstract

A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsMarc Joye
PublisherSpringer Verlag
Pages68-79
Number of pages12
ISBN (Print)3540008470, 9783540008477
DOIs
Publication statusPublished - 2003
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2612
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'An analysis of proxy signatures: Is a secure channel necessary?'. Together they form a unique fingerprint.

  • Cite this

    Lee, J. Y., Cheon, J. H., & Kim, S. (2003). An analysis of proxy signatures: Is a secure channel necessary? In M. Joye (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 68-79). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2612). Springer Verlag. https://doi.org/10.1007/3-540-36563-x_5