Design of proxy signature schemes using self-certified public keys from pairings

Chien Lung Hsu, Yu Hao Chuang, Pei Ling Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper designs a system model of flexible proxy signature schemes and introduces some realizations for this model from pairings. The proxy signature scheme allows an original signer to delegate his signing authority to a designated person called proxy signer. With that the proxy signer can sign a message through anonymous or non-anonymous methods alternatively, which is depending on the different demand as well as the property of a message. For these reasons, we introduce message recovery and appendix approaches to satisfy the applications of short message and long message, respectively. From the perspective of any verifier, checking the validity of the proxy signature can be accomplished through the verification of the public key in a logically single step, which is advantageous in communication overhead. Finally, we analyze the proposed proxy signature schemes from several security points of view.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Han-Chieh Chao, Stephen Jenn-Hwa Yang
PublisherIOS Press BV
Pages914-924
Number of pages11
ISBN (Electronic)9781614994831
DOIs
StatePublished - 2015
Externally publishedYes
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 12 12 201414 12 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume274
ISSN (Print)0922-6389
ISSN (Electronic)1879-8314

Conference

ConferenceInternational Computer Symposium, ICS 2014
Country/TerritoryTaiwan
CityTaichung
Period12/12/1414/12/14

Bibliographical note

Publisher Copyright:
© 2015 The authors and IOS Press. All rights reserved.

Keywords

  • anonymity
  • message recovery
  • pairings
  • proxy signature
  • self-certified

Fingerprint

Dive into the research topics of 'Design of proxy signature schemes using self-certified public keys from pairings'. Together they form a unique fingerprint.

Cite this