scispace - formally typeset
Search or ask a question
Book ChapterDOI

ECDLP Based Proxy Multi-signature Scheme

01 Jan 2012-pp 71-79
TL;DR: This paper proposes efficient and secure Proxy multi-signature scheme based on elliptic curve cryptosystem which needs less computation overhead compared to modular exponentiation and is withstand against original signer forgery and public key substitution attack.
Abstract: A Proxy signature scheme enables a proxy signer to sign a message on behalf of the original signer. In this paper, we propose efficient and secure Proxy multi-signature scheme based on elliptic curve cryptosystem. Our scheme satisfy all the proxy requirements and require only elliptic curve multiplication and elliptic curve addition which needs less computation overhead compared to modular exponentiation also our scheme is withstand against original signer forgery and public key substitution attack.
References
More filters
Proceedings ArticleDOI
01 Jan 1996
TL;DR: A new type of digital proxy signature, based on the discrete logarithm problem, which has a direct form, and a verifier does not need a public key of a user other than the original signer in the verification stage, and requires less amount of computational work than the consecutive execution of the signature schemes.
Abstract: In this paper a new type of digital proxy signature is proposed. The proxy signature allows a designated person, called a proxy signer, to sign on behalf of an original signer. Classification of the proxy signatures is shown from the point of view of the degree of delegation, and conditions of a proposed proxy signature for partial delegation are clarified. The proposed proxy signature scheme is based on the discrete logarithm problem. Compared to the consecutive execution of the ordinary digital signature schemes, it has a direct form, and a verifier does not need a public key of a user other than the original signer in the verification stage. Moreover, it requires less amount of computational work than the consecutive execution of the signature schemes. Due to this efficiency together with the delegation property, an organization, e.g. a software company, can very efficiently create many signatures of its own by delegating its signing operations to multiple employees. Another attractive feature of the proposed schemes is their highapplicability to other ordinary signature schemes based on the discrete logarithm problem. For instance, designated confirmer proxy signatures can be constructed. Furthermore, using a proposed on-line proxy updating protocol, the original signer can revoke proxies of dishonest proxy signers.

646 citations

Book ChapterDOI
11 Nov 1997
TL;DR: Two new types of digital proxy signatures called partial delegation with warrant and threshold delegation are presented, which combines the benefit of Mambo's partial delegation and Neuman's delegation by warrant and the proxy signer's power to sign messages is shared.
Abstract: Proxy signatures, introduced by Mambo, Usuda and Okamoto allow a designated person to sign on behalf of an original signer. This paper first presents two new types of digital proxy signatures called partial delegation with warrant and threshold delegation. Proxy signatures for partial delegation with warrant combines the benefit of Mambo's partial delegation and Neuman's delegation by warrant, and then in threshold delegation the proxy signer's power to sign messages is shared. Moreover, we also propose straightforward and concrete proxy signature schemes satisfying our conditions.

437 citations

Journal ArticleDOI
TL;DR: A new type of proxy signature scheme is presented called the proxy multi-signature scheme in which a proxy signer can generate a proxy signature on behalf of two or more original signers.
Abstract: Proxy signature schemes allow a proxy signer to generate a proxy signature on behalf of an original signer. However, since in previous proxy signature schemes a proxy signature is created on behalf of only one original signer, these schemes are referred to as proxy mono-signature schemes. A new type of proxy signature scheme is presented called the proxy multi-signature scheme in which a proxy signer can generate a proxy signature on behalf of two or more original signers.

191 citations

Patent
14 Mar 2013
Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.

111 citations

Journal ArticleDOI
TL;DR: This paper presented a new proxy multi-signature scheme that requires less computational efforts and communication costs, and has the properties that the size of a proxy signature is independent of the number of the original signers, and the validity of aproxy signature and public keys can be verified simultaneously.

58 citations