Skip to main content
13
Views
217
Downloads
1
1
1
1
1
1
Reviewed article

Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms

How to cite:
Wei- Bin Lee, Tzung-Her Chen
"Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms"
Information & Security: An International Journal,
12
no. 2
(2003):
250-258.
http://dx.doi.org/10.11610/isij.1215

Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms

Source:

Information & Security: An International Journal,
Volume: 12,
Issue2,
p.250-258
(2003)

Abstract:

A proxy signature allows a designated person, called a proxy signer, to sign a message on behalf of an original signer. Many proxy signature-related schemes have been proposed due to the fact that this type of scheme is very important. However, these new schemes always face security challenges. To minimize security challenges, the objective of the authors of this paper is to construct a proxy signature scheme that combines existing security mechanisms, rather than attempting to invent a new scheme. They believe that the proposed proxy signature scheme not only satisfies the essential properties mentioned in Mambo-Usuda-Okamoto’s proxy signature scheme but also has additional advantages, such as non-repudiation and prevention of delegation transfer. Furthermore, the fewer security challenges and easy implementation are direct benefits obtained from using the existing mechanisms

13
Views
217
Downloads
1
1
1
1
1
1
6
Citations
Journal of Information Assurance and Security (JIAS)
5
(2010):
Department of Computer Science, College of Computer Science
Doctor of Philosophy in Computer Science
(2005):
Department of Computer Science and Information Engineering, College of Electrical Engineering and Computer Science
Doctor of Philosophy in Computer Science and Information Engineering
(2005):
Eighth International Conference on Intelligent Systems Design and Applications
(2008):
2nd International Conference on Computer Engineering and Technology
(2010):