Factoring based proxy signature schemes

In proxy signature schemes, original signers delegate proxy signers to sign messages on behalf of original signers. Currently, most proxy signature schemes are based on the difficulty of discrete logarithms over finite field or ellipse curve addition group. Based on the difficulty of factorings of large integers, one normal proxy signature scheme and one multi-proxy signature scheme are proposed. The security properties of strong unforgeability, verifiability, strong nonrepudiation, strong identifiability, distinguishability and prevention of misuse of proxy signing power can be fulfilled by the proposed schemes. In addition, the performance of the proposed schemes is analysed as well.

[1]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[2]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[3]  Zhenfu Cao,et al.  Nonrepudiable proxy multi-signature scheme , 2003, Journal of Computer Science and Technology.

[4]  Hung-Min Sun,et al.  Remark on Two Nonrepudiable Proxy Signature Schemes , 1999 .

[5]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[6]  Torben P. Pedersen Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.

[7]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[8]  Zuhua Shao,et al.  Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..

[9]  Zhenfu Cao A threshold key escrow scheme based on public key cryptosystem , 2001 .

[10]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[11]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[12]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[13]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[14]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[15]  Min-Shiang Hwang,et al.  Generalization of proxy signature based on elliptic curves , 2004, Comput. Stand. Interfaces.

[16]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[17]  Yi Li-jiang Proxy Multi-Signature:A New Type of Proxy Signature Schemes , 2001 .

[18]  Min-Shiang Hwang,et al.  Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..

[19]  Vijay Varadharajan,et al.  An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[21]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.

[22]  Shin-Jia Hwang,et al.  New multi-proxy multi-signature schemes , 2004, Appl. Math. Comput..

[23]  Min-Shiang Hwang,et al.  On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..

[24]  Zuhua Shao,et al.  Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.

[25]  Yu-Fang Chung,et al.  A proxy-protected proxy signature scheme based on elliptic curve cryptosystem , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..

[26]  Li Ji IMPROVEMENT OF A THRESHOLD PROXY SIGNATURE SCHEME , 2002 .

[27]  Ji Jia A New Proxy Multi-Signature Scheme , 2004 .

[28]  Cao,et al.  Improvement of M-U-O and K-P-W proxy signature schemes , 2002 .

[29]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[30]  Chien-Lung Hsu,et al.  New proxy multi-signature scheme , 2005, Appl. Math. Comput..