Abstract
This paper designs a system model of flexible proxy signature schemes and introduces some realizations for this model from pairings. The proxy signature scheme allows an original signer to delegate his signing authority to a designated person called proxy signer. With that the proxy signer can sign a message through anonymous or non-anonymous methods alternatively, which is depending on the different demand as well as the property of a message. For these reasons, we introduce message recovery and appendix approaches to satisfy the applications of short message and long message, respectively. From the perspective of any verifier, checking the validity of the proxy signature can be accomplished through the verification of the public key in a logically single step, which is advantageous in communication overhead. Finally, we analyze the proposed proxy signature schemes from several security points of view.
| Original language | English |
|---|---|
| Title of host publication | Intelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014 |
| Editors | William Cheng-Chung Chu, Han-Chieh Chao, Stephen Jenn-Hwa Yang |
| Publisher | IOS Press BV |
| Pages | 914-924 |
| Number of pages | 11 |
| ISBN (Electronic) | 9781614994831 |
| DOIs | |
| State | Published - 2015 |
| Externally published | Yes |
| Event | International Computer Symposium, ICS 2014 - Taichung, Taiwan Duration: 12 12 2014 → 14 12 2014 |
Publication series
| Name | Frontiers in Artificial Intelligence and Applications |
|---|---|
| Volume | 274 |
| ISSN (Print) | 0922-6389 |
| ISSN (Electronic) | 1879-8314 |
Conference
| Conference | International Computer Symposium, ICS 2014 |
|---|---|
| Country/Territory | Taiwan |
| City | Taichung |
| Period | 12/12/14 → 14/12/14 |
Bibliographical note
Publisher Copyright:© 2015 The authors and IOS Press. All rights reserved.
Keywords
- anonymity
- message recovery
- pairings
- proxy signature
- self-certified