C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK

This paper reviews the recent advances on proxy signatures, discusses few notable proposals, analyzes schemes' security and efficiency, and provides an overall remark of these proposals.

[1]  Germán Sáez,et al.  Revisiting Fully Distributed Proxy Signature Schemes , 2004, INDOCRYPT.

[2]  Germán Sáez,et al.  Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures , 2003, Financial Cryptography.

[3]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[4]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.

[5]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[6]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[7]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[8]  Yumin Wang,et al.  Convertible Nominative Signatures , 2004, ACISP.

[9]  Shin-Jia Hwang,et al.  Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers , 2003, Informatica.

[10]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[11]  Miguel Mira da Silva,et al.  Secure Mobile Agent Digital Signatures with Proxy Certificates , 2001, E-Commerce Agents.

[12]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[13]  Ashutosh Saxena,et al.  Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..

[14]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[15]  Guilin Wang,et al.  Designated-Verifier Proxy Signature Schemes , 2005, SEC.

[16]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[17]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[18]  G. Frey,et al.  A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .

[19]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[20]  Zuhua Shao,et al.  Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..

[21]  Yu-Fang Chung,et al.  Efficient proxy multisignature schemes based on the elliptic curve cryptosystem , 2003, Comput. Secur..

[22]  Amit K. Awasthi,et al.  A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures , 2003, IACR Cryptol. ePrint Arch..

[23]  Ran Canetti,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[24]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[25]  Robert H. Deng,et al.  Security Analysis of Some Proxy Signatures , 2003, ICISC.

[26]  Yu-Fang Chung,et al.  A traceable proxy multisignature scheme based on the elliptic curve cryptosystem , 2004, Appl. Math. Comput..

[27]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[28]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[29]  Takeshi Okamoto,et al.  A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[30]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[31]  Yi Mu,et al.  m out of n Oblivious Transfer , 2002, ACISP.

[32]  Paulo S. L. M. Barreto,et al.  Fast hashing onto elliptic curves over fields of characteristic 3 , 2001, IACR Cryptol. ePrint Arch..

[33]  Palash Sarkar HEAD: Hybrid Encryption with Delegated Decryption Capability , 2004, INDOCRYPT.

[34]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[35]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[36]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[37]  Zhenfu Cao,et al.  A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme , 2005, ISPA Workshops.

[38]  Min-Shiang Hwang,et al.  Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..

[39]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[40]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[41]  Eric Jui-Lin Lu,et al.  Abstract , 2003, Appetite.

[42]  Gerardo Pelosi,et al.  Computing Tate Pairing on Smartcards , 2005 .

[43]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[44]  Kwangjo Kim,et al.  ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .

[45]  Yuan Zhou,et al.  Constructing Secure Proxy Cryptosystem , 2005, CISC.

[46]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[47]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[48]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[49]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[50]  Morrie Gasser,et al.  The Digital Distributed System Security Architecture , 1989 .

[51]  Hung-Min Sun,et al.  On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..

[52]  Zuowen Tan,et al.  Provably secure delegation-by-certification proxy signature schemes , 2004, InfoSecu '04.

[53]  Robert H. Deng,et al.  Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..

[54]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[55]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[56]  Satoshi Obana,et al.  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.

[57]  Mingsheng Wang,et al.  On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.

[58]  Jonathan Katz,et al.  A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.

[59]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[60]  Yuan Zhou,et al.  An Efficient Proxy-Protected Signature Scheme Based on Factoring , 2005, ISPA Workshops.

[61]  Tzong-Chen Wu,et al.  Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..

[62]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[63]  Hung-Min Sun,et al.  Design of time-stamped proxy signatures with traceable receivers , 2000 .

[64]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[65]  Zhenfu Cao,et al.  Identity-Based Threshold Proxy Signature Scheme with Known Signers , 2006, TAMC.

[66]  Ed Dawson,et al.  Signature Scheme for Controlled Environments , 1999, ICICS.

[67]  Chien-Lung Hsu,et al.  New proxy multi-signature scheme , 2005, Appl. Math. Comput..

[68]  Germán Sáez,et al.  Fully Distributed Proxy Signature Schemes , 2002, IACR Cryptol. ePrint Arch..

[69]  Qiu-Liang Xu,et al.  An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[70]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[71]  Ashutosh Saxena,et al.  Security Analysis of Lal and Awasthi's Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..

[72]  Amit K. Awasthi,et al.  A Multi-proxy Signature Scheme for Partial delegation with Warrant , 2005, ArXiv.

[73]  Byoung heon LEEy,et al.  Strong Proxy Signatures , 1999 .

[74]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[75]  Hossein Ghodosi,et al.  Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes , 1999, ACISP.

[76]  Anton Cerný,et al.  Proxy and Threshold One-Time Signatures , 2003, ACNS.

[77]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[78]  Zuhua Shao,et al.  Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.

[79]  Victor K.-W. Wei,et al.  A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[80]  Huaxiong Wang,et al.  Efficient One-Time Proxy Signatures , 2003, ASIACRYPT.

[81]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.

[82]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[83]  Guilin Wang,et al.  Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[84]  Reihaneh Safavi-Naini,et al.  New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..

[85]  Marcus Stögbauer Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .

[86]  Xiaolei Dong,et al.  Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[87]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[88]  Zhenfu Cao,et al.  A Proxy-Protected Signature Scheme Based on Finite Automaton , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[89]  Min-Shiang Hwang,et al.  Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers , 2003, Informatica.

[90]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[91]  Xinmei Wang,et al.  Further Cryptanalysis of some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..

[92]  Patrick Horster,et al.  Self-certified keys — Concepts and Applications , 1997 .

[93]  Ming-Feng Lee,et al.  The security of a strong proxy signature scheme with proxy signer privacy protection , 2005, Appl. Math. Comput..

[94]  Ashutosh Saxena,et al.  An Efficient Proxy Signature Scheme with Revocation , 2004, Informatica.

[95]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[96]  Jean-Jacques Quisquater,et al.  A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.

[97]  Zhenfu Cao,et al.  An Efficient ID-Based Multi-proxy Multi-Signature Scheme , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[98]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, EUROCRYPT.

[99]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[100]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..