Abstract
Proxy signature, which allows an original signer to delegate his/her signing right to another party (or proxy signer), is very useful in many applications. Conventional proxy signature only allows the original signer to specify in the warrant the validity time period of the delegation but not the number of proxy signatures the proxy signer can generate. To address this problem, in this paper, we provide a formal treatment for k-time proxy signature. Such a scheme allows a designated proxy signer to produce only a fixed number of proxy signatures on behalf of the original signer. We provide the formal definitions and adversary models for k-time proxy signature, and propose an efficient construction which is provably secure against different types of adversaries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Awasthi, A.K., Lal, S.: ID-based ring signature and proxy ring signature schemes from bilinear pairings. arXiv preprint cs/0504097 (2005)
Awasthi, A.K., Lal, S.: Proxy blind signature scheme. Transaction on Cryptology 2(1), 5–11 (2005)
Bicakci, K., Tsudik, G., Tung, B.: How to construct optimal one-time signatures. Computer Networks 43(3), 339–349 (2003)
Chen, X., Zhang, F., Kim, K.: ID-based multi-proxy signature and blind multisignature from bilinear pairings. Proceedings of KIISC 3, 11–19 (2003)
Choi, C.-J., Kim, Z., Kim, K.: Schnorr signature scheme with restricted signing capability and its application. In: Proc. of CSS (2003)
Foster, I.T., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computer and Communications Security, pp. 83–92 (1998)
Herranz, J., Sáez, G.: New identity-based ring signature schemes. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 27–39. Springer, Heidelberg (2004)
Hong, X., Chen, K.: Secure multiple-times proxy signature scheme. Computer Standards and Interfaces 31(1), 19–23 (2009)
Hwang, J.Y., Kim, H.-J., Lee, D.H., Lim, J.I.: Digital signature schemes with restriction on signing capability. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 324–335. Springer, Heidelberg (2003)
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Kim, W.-H., Yoon, H., Cheon, J.H.: Metered signatures: How to restrict the signing capability. Journal of Communications and Networks 12(3), 201–208 (2010)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of SCIS, pp. 603–608 (2001)
Liu, J., Huang, S.: Identity-based threshold proxy signature from bilinear pairings. Informatica 21(1), 41–56 (2010)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, pp. 48–57 (1996)
Mehta, M., Harn, L.: Efficient one-time proxy signatures. In: IEE Proceedings of the Communications, vol. 152, pp. 129–133. IET (2005)
Clifford Neuman, B.: Proxy-based authorization and accounting for distributed systems. In: ICDCS, pp. 283–291 (1993)
Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)
Pieprzyk, J., Wang, H., Xing, C.: Multiple-time signature schemes against adaptive chosen message attacks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 88–100. Springer, Heidelberg (2004)
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)
Wang, G.: Designated-verifier proxy signature schemes. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC. IFIP AICT, vol. 181, pp. 409–423. Springer, Heidelberg (2005)
Wang, T., Wei, Z.: One-time proxy signature based on quantum cryptography. Quantum Information Processing 11(2), 455–463 (2012)
Wei, B., Zhang, F., Chen, X.: Ring proxy signatures. Journal of Electronics (China) 25(1), 108–114 (2008)
Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 22–31. Springer, Heidelberg (2007)
Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 359–367. Springer, Heidelberg (2005)
Yu, Y., Mu, Y., Susilo, W., Sun, Y., Ji, Y.: Provably secure proxy signature scheme from factorization. Mathematical and Computer Modelling 55, 1160–1168 (2012)
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Zhang, F., Safavi-Naini, R., Lin, C.-Y.: New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing. IACR Cryptology ePrint Archive, 104 (2003)
Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W., Yang, G., Mu, Y., Wei, J. (2013). k-time Proxy Signature: Formal Definition and Efficient Construction. In: Susilo, W., Reyhanitabar, R. (eds) Provable Security. ProvSec 2013. Lecture Notes in Computer Science, vol 8209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41227-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-41227-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41226-4
Online ISBN: 978-3-642-41227-1
eBook Packages: Computer ScienceComputer Science (R0)