TY - GEN
T1 - A secure strong proxy signature scheme with proxy signer privacy protection
AU - Lee, Youn Ho
AU - Hong, Seong Min
AU - Yoon, Hyunsoo
PY - 2005
Y1 - 2005
N2 - A proxy signature scheme enables an entity to delegate its signing rights to another entity. Since the proxy signature concept was proposed by Marnbo et al., many variant schemes have been appeared. In this paper, we propose a new proxy signature scheme with a proxy signer's privacy protection. In proxy signer's privacy scenario, the identity of the proxy signer cannot be revealed in a proxy signature unless the alias authority reveals it. The verifier only knows that the proxy signer is certified by the alias authority. The anonymity of the proxy signer gives an additional application such as electronic voting, electronic cash. In 2002, Shum et al. firstly proposed a scheme. But this scheme was broken because it is based on die LKK proxy signature scheme which is known to be insecure. We modify the triple Schnorr scheme and apply the modified result to our scheme. Proxy Signature Digital Signature Security Privacy Protection.
AB - A proxy signature scheme enables an entity to delegate its signing rights to another entity. Since the proxy signature concept was proposed by Marnbo et al., many variant schemes have been appeared. In this paper, we propose a new proxy signature scheme with a proxy signer's privacy protection. In proxy signer's privacy scenario, the identity of the proxy signer cannot be revealed in a proxy signature unless the alias authority reveals it. The verifier only knows that the proxy signer is certified by the alias authority. The anonymity of the proxy signer gives an additional application such as electronic voting, electronic cash. In 2002, Shum et al. firstly proposed a scheme. But this scheme was broken because it is based on die LKK proxy signature scheme which is known to be insecure. We modify the triple Schnorr scheme and apply the modified result to our scheme. Proxy Signature Digital Signature Security Privacy Protection.
UR - https://www.scopus.com/pages/publications/84906969509
M3 - Conference contribution
AN - SCOPUS:84906969509
SN - 9806560485
SN - 9789806560482
T3 - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
SP - 33
EP - 38
BT - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005, Proceedings
PB - International Institute of Informatics and Systemics, IIIS
T2 - 3rd International Conference on Computing, Communications and Control Technologies, CCCT 2005
Y2 - 24 July 2005 through 27 July 2005
ER -