TY - JOUR KW - certification authority KW - Digital Signature KW - proxy signature KW - time stamp authority AU - Wei- Bin Lee AU - Tzung-Her Chen AB -
A proxy signature allows a designated person, called a proxy signer, to sign a message on behalf of an original signer. Many proxy signature-related schemes have been proposed due to the fact that this type of scheme is very important. However, these new schemes always face security challenges. To minimize security challenges, the objective of the authors of this paper is to construct a proxy signature scheme that combines existing security mechanisms, rather than attempting to invent a new scheme. They believe that the proposed proxy signature scheme not only satisfies the essential properties mentioned in Mambo-Usuda-Okamoto’s proxy signature scheme but also has additional advantages, such as non-repudiation and prevention of delegation transfer. Furthermore, the fewer security challenges and easy implementation are direct benefits obtained from using the existing mechanisms
BT - Information & Security: An International Journal DA - 2003 DO - http://dx.doi.org/10.11610/isij.1215 IS - 2 LA - eng N2 -A proxy signature allows a designated person, called a proxy signer, to sign a message on behalf of an original signer. Many proxy signature-related schemes have been proposed due to the fact that this type of scheme is very important. However, these new schemes always face security challenges. To minimize security challenges, the objective of the authors of this paper is to construct a proxy signature scheme that combines existing security mechanisms, rather than attempting to invent a new scheme. They believe that the proposed proxy signature scheme not only satisfies the essential properties mentioned in Mambo-Usuda-Okamoto’s proxy signature scheme but also has additional advantages, such as non-repudiation and prevention of delegation transfer. Furthermore, the fewer security challenges and easy implementation are direct benefits obtained from using the existing mechanisms
PY - 2003 SE - 250 SP - 250 EP - 258 T2 - Information & Security: An International Journal TI - Constructing a Proxy Signature Scheme Based on Existing Security Mechanisms VL - 12 ER -