A new proxy signcryption scheme using warrants

In this paper, a new proxy signcryption scheme is proposed suitable for use by resource constrained devices such as pagers and mobile phones. The proposed scheme is based on delegating the signing rights of the original signer to one of his proxies using warrants. The use of warrants enables explicit specification of the signing rights of the proxy agent. The proxy agent and the original signer are assumed to be registered within the same traditional public key infrastructure. To offer a higher level of security, the proxy key is derived from the personal key of the proxy signer to prevent the proxy signer from denying a signature it created and protects it from framing attacks mounted by the original signer against it. We also consider a variant of our main scheme that works over elliptic curves since they have proven recently the possibility of reducing the key sizes.

[1]  Jussipekka Leiwo,et al.  An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption , 1998 .

[2]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Public Key Cryptography.

[3]  Yuliang Zheng,et al.  Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.

[4]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[7]  Silvio Micali,et al.  The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.

[8]  G. Frey,et al.  A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .

[9]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[10]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[11]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[12]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[13]  Yuan Zhou,et al.  Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme , 2005, CIS.

[14]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[15]  Yuliang Zheng,et al.  Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.