Filters








6,935 Hits in 2.9 sec

Proxy Signatures Secure Against Proxy Key Exposure [chapter]

Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson
Public Key Cryptography – PKC 2008  
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al..  ...  We provide a generic construction for proxy signatures secure in our enhanced model using sequential aggregate signatures; our construction provides a benchmark by which future specific constructions may  ...  First and foremost, we define a refined security model for proxy signatures along with the security notion Proxy Signature Unforgeability Under an Adaptive Chosen Message Attack with Proxy Key Exposure  ... 
doi:10.1007/978-3-540-78440-1_9 dblp:conf/pkc/SchuldtMP08 fatcat:sowzthqpgbeybbp4z6xxbxinqy

The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures [chapter]

Tal Malkin, Satoshi Obana, Moti Yung
2004 Lecture Notes in Computer Science  
security of signature schemes, localizing the damage of secret key exposure.  ...  Next, we prove that proxy signatures are, in fact, equivalent to key-insulated signatures.  ...  We believe that directly relating proxy signing (which is a trust management and flexibility mechanism) to that of key evolving signatures (which are mechanisms to protect against key exposure attacks)  ... 
doi:10.1007/978-3-540-24676-3_19 fatcat:ilwknuqlgbfdxaudsanxxq37ym

Provably Secure Forward Secure Certificateless Proxy Signature Scheme

2013 KSII Transactions on Internet and Information Systems  
In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of the forward secure  ...  certificateless proxy signature.  ...  message/proxy signature in any time period t ( 0 tT  , T is the key exposure time period).  ... 
doi:10.3837/tiis.2013.08.013 fatcat:z2lzmpehbncilizico3ylipgt4

An efficient forward-secure proxy-protected signature scheme based on the strong RSA assumption

Akram A. M. Naji, Yahya Abu Hasan
2010 2010 3rd International Conference on Computer Science and Information Technology  
As an ordinary digital signature scheme, a proxy signature is a vulnerable to the key exposure problem. In case, the secret signing key of the authorized user is be revealed or stolen.  ...  The aim of this paper is to put forth a proxy signature scheme, which has forward secrecy technique to mitigate the damage caused by the key exposure problem, which is proved secure.  ...  Our proposed scheme is a better treatment to minimize the risk of key exposure and enhance the security of a proxy signature.  ... 
doi:10.1109/iccsit.2010.5564931 fatcat:kfvqhb4zyrbl7eumxrulllmcjm

Secure Delegation of Signing Power from Factorization

Y. Yu, M. H. Au, Y. Mu, W. Susilo, H. Wu
2013 Computer journal  
In this paper, we propose a novel, ecient and provably secure proxy signature scheme from factorization.  ...  In this paper, we propose a novel, efficient and provably secure proxy signature scheme from factorization.  ...  Obviously, the approach requires key exposure-free chameleon hash function since a proxy signatures consist of a collision.  ... 
doi:10.1093/comjnl/bxt144 fatcat:kpwqepvkbnaa7h7lqmcppzamaq

Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model

Liaojun Pang, Huiyang Zhao, Xia Zhou, Huixian Li
2016 International Journal of Distributed Sensor Networks  
Analyses show that the proposed scheme satisfies all of the security requirements of proxy signature and has shorter public parameters than the existing ones.  ...  The existing proxy signature schemes with the proxy revocation function are proven to be malleable and do not possess strong unforgeability.  ...  For proxy signature schemes, the first security model was proposed by Mambo et al. [15] . However, this model was vulnerable to proxy key exposure attacks.  ... 
doi:10.1155/2016/3205206 fatcat:h22mewu45vdmlkdz7beb72qf44

A provably secure identity-based proxy ring signature based on RSA

Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2014 Security and Communication Networks  
The construction is proved secure, under the one-wayness assumption of RSA, in the random oracle model by presenting a new forking lemma.We should highlight that the proxy key exposure attack cannot be  ...  First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work.  ...  We should highlight that our scheme not only is the first identity-based proxy ring signature with provable security according to a formally defined security model and is resistance against proxy key exposure  ... 
doi:10.1002/sec.1076 fatcat:la6hrcnvmvh3bi2ltrjmzrlnka

An Improved Proxy Blind Signature Scheme with Forward Security

Manoj KumarChande, Balwant Singh Thakur
2014 International Journal of Computer Applications  
Forward security mechanism will provide protection to the system from the key leakage or key exposure, because in this mechanism, the private key of proxy signer is updated periodically.  ...  This paper presents a proxy blind signature scheme with forward security mechanism.  ...  The proxy blind signature must satisfy the security properties of proxy signature and blind signature, and security properties for a good proxy blind signature schemes are as follows [3] .  ... 
doi:10.5120/14914-3321 fatcat:xfv2kjev5fh3dbku4t36qpqjgm

ADVANCED SECURITY FOR MANETS USING THRESHOLD CRYPTOGRAPHY

H. Ateeq Ahmed .
2015 International Journal of Research in Engineering and Technology  
We considered the role of threshold cryptography to provide advanced security for the MANETs, revealing the authorization process using threshold digital signature, proxy signature and multi-signature  ...  One of the challenging issues for such environments is secure authentication.  ...  ACKNOWLEDGEMENTS We wish to thanks the previous authors for providing a nice concept in the area of security.  ... 
doi:10.15623/ijret.2015.0414011 fatcat:6uin7y72hfbpbei4bwpovamtjq

Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations

Sanjit Chatterjee, ,Department of Computer Science and Automation, Indian Institute of Science, India, Berkant Ustaoğlu, ,Izmir Institute of Technology, Urla, Izmir, 35430 Turkey
2019 Advances in Mathematics of Communications  
Noticing the ad-hoc nature of security analysis prevalent in the existing literature, Boldyreva, Palacio and Warinschi proposed a formal security model for proxy signature.  ...  We revisit their proposed security definition in the context of the most natural construction of proxy signature -delegation-by-certificate.  ...  In particular, an EU-UEO adversary A against the signature via a reduction R can be transformed into an adversary against the proxy signature.  ... 
doi:10.3934/amc.2020015 fatcat:s5dw2ms6zzgzbnrfyvlmyx5ie4

Secure Mobile Agent from Leakage-Resilient Proxy Signatures

Fei Tang, Hongda Li, Qihua Niu, Bei Liang
2015 Mobile Information Systems  
The proxy signatures which are secure in the traditional security models obviously cannot provide such security.  ...  In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures.  ...  Similarly, A has no need to query the proxy key exposure queries.  ... 
doi:10.1155/2015/901418 fatcat:wu4acgt2r5bizdjkbguinnv2mm

A short identity-based proxy ring signature scheme from RSA

Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2015 Computer Standards & Interfaces  
The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation  ...  The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also it does not suffer from the proxy key exposure attack due to the use of the sequential aggregation  ...  Clearly, if an identity-based proxy ring signature scheme is secure against Type II (or Type III) adversaries then it is also secure against Type I adversary.  ... 
doi:10.1016/j.csi.2014.10.002 fatcat:orljsgcrrzgolhdvbhbozyiju4

Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

Yujue Wang, HweeHwa Pang, Robert H. Deng
2017 International Journal of Information Security  
Finally, we extend our scheme to CBS supporting designated instantiations, free instantiations, privately verifiable template signature, identity-based CBS, as well as CBS secure against proxy-key exposure  ...  It is formally proved to be secure against collusion attacks by the originator and proxies.  ...  Cascade-instantiable blank signature secure against key exposure Schuldt et al. [41] investigated multi-level proxy signatures with security against proxy-key exposure.  ... 
doi:10.1007/s10207-017-0372-2 fatcat:cwq6tz6n6rfmba57rxfcw3gfnm

A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

SK Hafizul Islam, G.P. Biswas
2014 Journal of King Saud University: Computer and Information Sciences  
Although many identity-based proxy signature schemes have been proposed in the literature, only a few proposals for identity-based strong designated verifier proxy signature (ID-SDVPS) schemes are available  ...  tool, and the simulation results confirm strong security against both active and passive attacks.  ...  Wang (2008) gave a new identity-based proxy signature scheme, which is secure against the proxy key exposure attack in the random oracle model (Bellare and Rogaway, 1993) .  ... 
doi:10.1016/j.jksuci.2013.03.004 fatcat:vjqax3mp2fbttb2dzu76hofzs4

An Improved ID-based Proxy Signature Scheme with Message Recovery

Caixue Zhou
2015 International Journal of Security and Its Applications  
In this paper, we show that their scheme is vulnerable to the forgery attack, and an adversary can forge a valid proxy signature for any message with knowing a previous valid proxy signature.  ...  In 2012, Singh and Verma proposed an ID-based proxy signature scheme with message recovery.  ...  Acknowledgements This work is supported by the National Natural Science Foundation of China (Grant No. 61462048) and the key program of Jiujiang University under Grant No. 2013ZD02.  ... 
doi:10.14257/ijsia.2015.9.9.14 fatcat:3kndubj5jrdargswqzdmpppgai
« Previous Showing results 1 — 15 out of 6,935 results