A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we resolve this issue by introducing so called warrant-hiding proxy signatures. ...
We provide a formal security definition of such schemes by augmenting the well established security model for proxy signatures by Boldyreva et al. ...
Acknowledgements: Both authors have been supported by the European Commission through project FP7-FutureID, grant agreement number 318424. ...
doi:10.1007/978-3-319-03515-4_5
fatcat:4caos2anknbffnlz4fnomfdoia
Anonymous Proxy Signatures
[chapter]
2008
Lecture Notes in Computer Science
Our primitive is a proper generalization of both group signatures and proxy signatures and can be regarded as non-frameable dynamic hierarchical group signatures. ...
The scheme satisfies a strong notion of non-frameability generalizing the one for dynamic group signatures. ...
The most prominent example of a proxy signature scheme is "delegation-by-certificate": The delegator signs a document called the warrant containing the public key of the proxy and passes it to the latter ...
doi:10.1007/978-3-540-85855-3_14
fatcat:xannwvsl5jgaxgctkjhlutgkii
Identity-Based Threshold Proxy Signature from Bilinear Pairings
2010
Informatica
We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate her signing capability to a group of n proxy signers, and it requires a consensus of t or more ...
proxy signers in order to generate a valid signature. ...
Proxy Certificate Generation Phase To delegate the signing capability to the proxy signer group PS, the original signer signs a warrant w and generates the proxy certificate. ...
doi:10.15388/informatica.2010.272
fatcat:i7nemng6zvglhmv2kn6ttaheze
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
[chapter]
2014
Lecture Notes in Computer Science
Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [25] and warrant-hiding proxy signatures [26] , have been introduced. ...
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. ...
In this paper, we consider two recently proposed instantiations of privacy-enhancing proxy signature schemes, namely warrant-hiding proxy signatures [26] (WHPS) as well as blank digital signatures [ ...
doi:10.1007/978-3-662-43936-4_4
fatcat:3tdjgmmkmng3znesngeoiozsry
A Smart-Card-Enabled Privacy Preserving E-Prescription System
2004
IEEE Transactions on Information Technology in Biomedicine
A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality. ...
To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. ...
, partial delegation, and delegation by warrant. ...
doi:10.1109/titb.2004.824731
pmid:15055801
fatcat:gunrk6hrr5cbro72vlrnjltchm
Proxy signature-based RSU message broadcasting in VANETs
2010
2010 25th Biennial Symposium on Communications
Our contribution includes modification of the proxy signature scheme in order to fulfill the security requirements of a VANET's message broadcast. ...
We propose a framework for a secure RSU-to-OBU message broadcasting in VANETs using proxy signatures. ...
ACKNOWLEDGMENT This work has been partially funded by APMA AUTO21 Project from the Govt. of Canada. ...
doi:10.1109/bsc.2010.5473015
fatcat:tee6476sknc7zopcskxw5kcpte
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
[chapter]
2009
Lecture Notes in Computer Science
The most trivial instantiation of proxy signatures is "delegation-by-certificate": The delegator signs a document called the warrant containing the public key of the proxy and passes it to the latter. ...
A proxy signature then consists of a regular signature by the proxy on the message and the signed warrant. Together they can by verified using the delegator's verification key only. ...
Acknowledgments This work was partially funded by EADS, CELAR, the French ANR-07-SESU-008-01 PAMPA Project and the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT. ...
doi:10.1007/978-3-642-02002-5_6
fatcat:rvnt3vl7azg6jkcxmuczyjoavq
Secure Mobile Agent Using Strong Non-designated Proxy Signature
[chapter]
2001
Lecture Notes in Computer Science
Mobile agent is a very good application example of proxy signature, and the undetachable signature can be considered as an example of proxy signature. ...
To construct mobile agents, [KBC00] used an RSA-based undetachable signature scheme, but it does not provide server's non-repudiation because the undetachable signature does not contain server's signature ...
[KPW97] extended them by using Schnorr signature and including warrant information in partial delegation schemes (partial delegation with warrant). ...
doi:10.1007/3-540-47719-5_37
fatcat:rpf4apcidbep5hmmhx6qgy6mp4
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation
2019
Symmetry
Our scheme achieves delegation information and signature existential unforgeability against adaptive chosen warrant and identity. ...
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages ...
., proposed the main idea as well as the concrete schemes of the paper. The second and third authors Q.W. and W.Y., gave all the figures and tables, as well as Sections 1 and 2. ...
doi:10.3390/sym11020272
fatcat:iwfiffg66zbjlkzxbolnylp5na
A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme
2022
Security and Communication Networks
In this paper, we propose a scheme called proxy promised signcryption to address all of these objectives simultaneously. ...
The proposed work aims to reduce computation and communication costs, which has been tested by comparing it to existing schemes. ...
Zhang [3] contributed a complete and partial proxy signature with certificates. Zeng and Park [4] designed a threshold proxy signature scheme. ...
doi:10.1155/2022/1232336
fatcat:pc6apbj47zf27atgf6a637mdne
Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
2013
Mathematical Problems in Engineering
In these days there are plenty of signature schemes such as the (t, n) threshold proxy signature scheme (Kumar and Verma 2010). ...
In this scheme, a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t − 1 or fewer of them cannot do it. ...
In this, the actual original signer cannot deny delegating the warrant or proxy signature either. Tzeng et al. ...
doi:10.1155/2013/790257
fatcat:s3txzl2mrbghxof2gnjfd6f5w4
Blank digital signatures
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
Then, a proxy is given the power to sign an instantiation of the template signed by the originator by using some secret information. ...
By an instantiation, the proxy commits to one allowed choice per blank field in the template. ...
The work of both authors has been supported by the European Commission through project FP7-FutureID, grant agreement number 318424. ...
doi:10.1145/2484313.2484324
dblp:conf/ccs/HanserS13
fatcat:ezb6fr6hh5bxjolk4e6vnfcqeu
Security and Privacy for Mobile Health-Care (m-Health) Systems
[chapter]
2012
Handbook on Securing Cyber-Physical Critical Infrastructure
The depth of the delegation chain will normally be defined by the primary physician. In addition, delegation can be realized through proxy signature/certificate and XML-based approaches. ...
White's signature HIDS ψ White ,S White on the warrant and the proxy signer PS 's signature HIDS ψ PS ,S PS on the delegation message, by performing HIDV PKT White (00 W PKT PS PKT R , HIDS ψ White ,S ...
These autonomic elements are expected to operate in a very dynamic environment, with only fixed policies (i.e., privacy and security policies in Figure 27 -3) and functions consisting of authentication, delegation ...
doi:10.1016/b978-0-12-415815-3.00027-3
fatcat:edqovx6labddpdolqoklluhhcq
Towards Authenticity and Privacy Preserving Accountable Workflows
[chapter]
2016
IFIP Advances in Information and Communication Technology
These patterns follow the well-known delegation-by-certificate approach from proxy signatures [37] , and-in contrast to existing solutions-allow to obtain particularly efficient schemes which only make ...
Signatures secure in this model are called warrant-hiding proxy signatures (WHPS). We note that proxy signatures are one instantiation of the more general concept of functional signatures [5, 8] . ...
doi:10.1007/978-3-319-41763-9_12
fatcat:52wvnoo7ajhk3b3bncmjzmutjq
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
[chapter]
2009
Lecture Notes in Computer Science
group and proxy signatures. ...
We illustrate our techniques by presenting the first instantiation of anonymous proxy signatures (in the standard model), a recent primitive unifying the functionalities and strong security notions of ...
Acknowledgments This work was supported in part by EADS, the French ANR-07-SESU-008-01 PAMPA Project and the European Commission through Contract ICT-2007-216676 ECRYPT II. ...
doi:10.1007/978-3-642-03298-1_10
fatcat:pprnqez6vfev5cgazzvk2hwnye
« Previous
Showing results 1 — 15 out of 361 results