Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/986537.986584acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

A privacy-protecting proxy signature scheme and its application

Published: 02 April 2004 Publication History

Abstract

Proxy signatures are signature schemes that a signer (called original signer) delegates his signing capability to other people (called proxy signer), and the proxy signer creates signatures on behalf of the original signer. In application such as electronic voting and electronic commerce, the privacy may be concerned by the original signer. The original signer may hope that the proxy signers can sign on behalf of him without knowing the content of the signed message. Few efforts have been put on privacy protection of original signer in existed proxy signature schemes. In this paper, a privacy-protecting proxy signature scheme is proposed. In this scheme, the messages the original signer entrust to the proxy signer to sign on behalf of him are secret from the proxy signer during the generation of the proxy signature and from other people except the receiver designated by the original signer. Therefore, the privacy of the original signer is protected. The security of the proposed signature scheme is analyzed and its application to electronic voting is described.

References

[1]
Camenisch, L. J., Piveteau, M. J., Stadler, A. M. Blind signatures based on the discrete logarithm problem. Advances in Cryptology '92 Springer-Verlag, 1995. pp. 428--432
[2]
Chaum, D. Blind signatures for untraceable payments. Advances in Cryptology Crypto'82 Springer-verlag. 1982, pp. 199--203.
[3]
ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms.Advances in Cryptology'84. Springer-Verlag, 1985. pp. 10--18
[4]
Lee, B., Kim, H., Kim, K. Strong proxy signature and its application. The 2001 Symposium on Cryptography and Information Security. Oiso, Japan. January, 2001. Vol2/2. pp. 603--608
[5]
Mambo, M., Usuda, K., and Okamoto, E. Proxy signatures for delegating signing operation, Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India, ACM Press New York, pp. 48--57, 1996.
[6]
Pointcheval, D., Stern, J. Security proofs for signature schemes. Advance in Cryptology-Proc of EUROCRYPT'96. LNCS 1070, Springer-verlag. 1996, pp. 387--398.
[7]
Schnorr, C. P. Efficient identification and signatures for smart cards. Advances in cryptology-crypto'89, LNCS, Vol. 435, Springer-verlag, pp. 239--252, 1990.
[8]
Zhang, K. Threshold proxy signature schemes. In Proc. 1st International Information Security Workshop, ISW'97, LNCS 1396, Springer-Verlag, 1997. pp. 191--197

Cited By

View all
  • (2012)A New Proxy Electronic Voting Scheme Based on Proxy SignaturesFuture Information Technology, Application, and Service10.1007/978-94-007-4516-2_1(3-12)Online publication date: 5-Jun-2012
  • (2006)Security weaknesses in two proxy signature schemesProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_50(466-475)Online publication date: 8-May-2006
  • (2004)Improved Privacy-Protecting Proxy Signature SchemeContent Computing10.1007/978-3-540-30483-8_25(208-213)Online publication date: 2004

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ACMSE '04: Proceedings of the 42nd annual ACM Southeast Conference
April 2004
485 pages
ISBN:1581138709
DOI:10.1145/986537
  • General Chair:
  • Seong-Moo Yoo,
  • Program Chair:
  • Letha Hughes Etzkorn
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. electronic commerce
  2. electronic voting
  3. proxy signature
  4. security

Qualifiers

  • Article

Conference

ACM SE04
Sponsor:
ACM SE04: ACM Southeast Regional Conference 2004
April 2 - 3, 2004
Alabama, Huntsville

Acceptance Rates

Overall Acceptance Rate 502 of 1,023 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2012)A New Proxy Electronic Voting Scheme Based on Proxy SignaturesFuture Information Technology, Application, and Service10.1007/978-94-007-4516-2_1(3-12)Online publication date: 5-Jun-2012
  • (2006)Security weaknesses in two proxy signature schemesProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_50(466-475)Online publication date: 8-May-2006
  • (2004)Improved Privacy-Protecting Proxy Signature SchemeContent Computing10.1007/978-3-540-30483-8_25(208-213)Online publication date: 2004

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media