361 Hits in 7.2 sec

Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes [chapter]

Christian Hanser, Daniel Slamanig
2013 Lecture Notes in Computer Science  
In this paper, we resolve this issue by introducing so called warrant-hiding proxy signatures.  ...  We provide a formal security definition of such schemes by augmenting the well established security model for proxy signatures by Boldyreva et al.  ...  Acknowledgements: Both authors have been supported by the European Commission through project FP7-FutureID, grant agreement number 318424.  ... 
doi:10.1007/978-3-319-03515-4_5 fatcat:4caos2anknbffnlz4fnomfdoia

Anonymous Proxy Signatures [chapter]

Georg Fuchsbauer, David Pointcheval
2008 Lecture Notes in Computer Science  
Our primitive is a proper generalization of both group signatures and proxy signatures and can be regarded as non-frameable dynamic hierarchical group signatures.  ...  The scheme satisfies a strong notion of non-frameability generalizing the one for dynamic group signatures.  ...  The most prominent example of a proxy signature scheme is "delegation-by-certificate": The delegator signs a document called the warrant containing the public key of the proxy and passes it to the latter  ... 
doi:10.1007/978-3-540-85855-3_14 fatcat:xannwvsl5jgaxgctkjhlutgkii

Identity-Based Threshold Proxy Signature from Bilinear Pairings

Jenshiuh Liu, Shaonong Huang
2010 Informatica  
We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate her signing capability to a group of n proxy signers, and it requires a consensus of t or more  ...  proxy signers in order to generate a valid signature.  ...  Proxy Certificate Generation Phase To delegate the signing capability to the proxy signer group PS, the original signer signs a warrant w and generates the proxy certificate.  ... 
doi:10.15388/informatica.2010.272 fatcat:i7nemng6zvglhmv2kn6ttaheze

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials [chapter]

David Derler, Christian Hanser, Daniel Slamanig
2014 Lecture Notes in Computer Science  
Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [25] and warrant-hiding proxy signatures [26] , have been introduced.  ...  Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy.  ...  In this paper, we consider two recently proposed instantiations of privacy-enhancing proxy signature schemes, namely warrant-hiding proxy signatures [26] (WHPS) as well as blank digital signatures [  ... 
doi:10.1007/978-3-662-43936-4_4 fatcat:3tdjgmmkmng3znesngeoiozsry

A Smart-Card-Enabled Privacy Preserving E-Prescription System

Y. Yang, X. Han, F. Bao, R.H. Deng
2004 IEEE Transactions on Information Technology in Biomedicine  
A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.  ...  To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card.  ...  , partial delegation, and delegation by warrant.  ... 
doi:10.1109/titb.2004.824731 pmid:15055801 fatcat:gunrk6hrr5cbro72vlrnjltchm

Proxy signature-based RSU message broadcasting in VANETs

Subir Biswas, Jelena Misic
2010 2010 25th Biennial Symposium on Communications  
Our contribution includes modification of the proxy signature scheme in order to fulfill the security requirements of a VANET's message broadcast.  ...  We propose a framework for a secure RSU-to-OBU message broadcasting in VANETs using proxy signatures.  ...  ACKNOWLEDGMENT This work has been partially funded by APMA AUTO21 Project from the Govt. of Canada.  ... 
doi:10.1109/bsc.2010.5473015 fatcat:tee6476sknc7zopcskxw5kcpte

Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures [chapter]

Georg Fuchsbauer, David Pointcheval
2009 Lecture Notes in Computer Science  
The most trivial instantiation of proxy signatures is "delegation-by-certificate": The delegator signs a document called the warrant containing the public key of the proxy and passes it to the latter.  ...  A proxy signature then consists of a regular signature by the proxy on the message and the signed warrant. Together they can by verified using the delegator's verification key only.  ...  Acknowledgments This work was partially funded by EADS, CELAR, the French ANR-07-SESU-008-01 PAMPA Project and the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT.  ... 
doi:10.1007/978-3-642-02002-5_6 fatcat:rvnt3vl7azg6jkcxmuczyjoavq

Secure Mobile Agent Using Strong Non-designated Proxy Signature [chapter]

Byoungcheon Lee, Heesun Kim, Kwangjo Kim
2001 Lecture Notes in Computer Science  
Mobile agent is a very good application example of proxy signature, and the undetachable signature can be considered as an example of proxy signature.  ...  To construct mobile agents, [KBC00] used an RSA-based undetachable signature scheme, but it does not provide server's non-repudiation because the undetachable signature does not contain server's signature  ...  [KPW97] extended them by using Schnorr signature and including warrant information in partial delegation schemes (partial delegation with warrant).  ... 
doi:10.1007/3-540-47719-5_37 fatcat:rpf4apcidbep5hmmhx6qgy6mp4

Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation

Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen
2019 Symmetry  
Our scheme achieves delegation information and signature existential unforgeability against adaptive chosen warrant and identity.  ...  Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages  ...  ., proposed the main idea as well as the concrete schemes of the paper. The second and third authors Q.W. and W.Y., gave all the figures and tables, as well as Sections 1 and 2.  ... 
doi:10.3390/sym11020272 fatcat:iwfiffg66zbjlkzxbolnylp5na

A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme

Farhad Ullah Khan, Fahad Algarni, Insaf Ullah, Hanen Karamti, Muhammad Anwaar Manzar, Ahmed Saeed Alzahrani, Muhammad Adnan Aziz, Muhammad Asghar Khan, Shehzad Ashraf Chaudhry
2022 Security and Communication Networks  
In this paper, we propose a scheme called proxy promised signcryption to address all of these objectives simultaneously.  ...  The proposed work aims to reduce computation and communication costs, which has been tested by comparing it to existing schemes.  ...  Zhang [3] contributed a complete and partial proxy signature with certificates. Zeng and Park [4] designed a threshold proxy signature scheme.  ... 
doi:10.1155/2022/1232336 fatcat:pc6apbj47zf27atgf6a637mdne

Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

Raman Kumar, Harsh Kumar Verma, Renu Dhir
2013 Mathematical Problems in Engineering  
In these days there are plenty of signature schemes such as the (t, n) threshold proxy signature scheme (Kumar and Verma 2010).  ...  In this scheme, a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t − 1 or fewer of them cannot do it.  ...  In this, the actual original signer cannot deny delegating the warrant or proxy signature either. Tzeng et al.  ... 
doi:10.1155/2013/790257 fatcat:s3txzl2mrbghxof2gnjfd6f5w4

Blank digital signatures

Christian Hanser, Daniel Slamanig
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
Then, a proxy is given the power to sign an instantiation of the template signed by the originator by using some secret information.  ...  By an instantiation, the proxy commits to one allowed choice per blank field in the template.  ...  The work of both authors has been supported by the European Commission through project FP7-FutureID, grant agreement number 318424.  ... 
doi:10.1145/2484313.2484324 dblp:conf/ccs/HanserS13 fatcat:ezb6fr6hh5bxjolk4e6vnfcqeu

Security and Privacy for Mobile Health-Care (m-Health) Systems [chapter]

Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
The depth of the delegation chain will normally be defined by the primary physician. In addition, delegation can be realized through proxy signature/certificate and XML-based approaches.  ...  White's signature HIDS ψ White ,S White on the warrant and the proxy signer PS 's signature HIDS ψ PS ,S PS on the delegation message, by performing HIDV PKT White (00 W PKT PS PKT R , HIDS ψ White ,S  ...  These autonomic elements are expected to operate in a very dynamic environment, with only fixed policies (i.e., privacy and security policies in Figure 27 -3) and functions consisting of authentication, delegation  ... 
doi:10.1016/b978-0-12-415815-3.00027-3 fatcat:edqovx6labddpdolqoklluhhcq

Towards Authenticity and Privacy Preserving Accountable Workflows [chapter]

David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig
2016 IFIP Advances in Information and Communication Technology  
These patterns follow the well-known delegation-by-certificate approach from proxy signatures [37] , and-in contrast to existing solutions-allow to obtain particularly efficient schemes which only make  ...  Signatures secure in this model are called warrant-hiding proxy signatures (WHPS). We note that proxy signatures are one instantiation of the more general concept of functional signatures [5, 8] .  ... 
doi:10.1007/978-3-319-41763-9_12 fatcat:52wvnoo7ajhk3b3bncmjzmutjq

Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures [chapter]

Georg Fuchsbauer, David Pointcheval
2009 Lecture Notes in Computer Science  
group and proxy signatures.  ...  We illustrate our techniques by presenting the first instantiation of anonymous proxy signatures (in the standard model), a recent primitive unifying the functionalities and strong security notions of  ...  Acknowledgments This work was supported in part by EADS, the French ANR-07-SESU-008-01 PAMPA Project and the European Commission through Contract ICT-2007-216676 ECRYPT II.  ... 
doi:10.1007/978-3-642-03298-1_10 fatcat:pprnqez6vfev5cgazzvk2hwnye
« Previous Showing results 1 — 15 out of 361 results