A New Forward-Secure Proxy Signature Scheme

Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it have the forward security. Even if the proxy signer's signature key at a certain time segment is given away, the attacker could not get the proxy signer's signature key in the previous time segment. Under these assumptions of strong RSA problem, computational Diffie-Hellman problem being hard, and discrete logarithm problem being hard in a finite field, the scheme has favorable security.

[1]  Zhang Bo Forward-secure proxy signature scheme based on RSA , 2011 .

[2]  Zhang Jian-zhong,et al.  Improved Forward-secure Proxy Signature Scheme , 2007 .

[3]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[4]  Y. Yeh,et al.  Forward-Secure Proxy Signature Scheme , 2003 .

[5]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[6]  Kazuo Ohta,et al.  A Modification of the Fiat-Shamir Scheme , 1988, CRYPTO.

[7]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Jean-Jacques Quisquater,et al.  A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.

[10]  Ross J. Anderson,et al.  Two remarks on public key cryptology , 2002 .

[11]  Claus-Peter Schnorr,et al.  Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.

[12]  Gene Itkis,et al.  Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.

[13]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[14]  Warren Bower New directions , 1937 .

[15]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[16]  Chien-Lung Hsu,et al.  New proxy multi-signature scheme , 2005, Appl. Math. Comput..

[17]  M. Shear FREE MEAT TALKS BACK , 1976 .

[18]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[19]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.