Abstract
A proxy signature scheme permits an entity to delegate its signing rights to another. These schemes have been suggested for use in numerous applications, particularly in distributed computing. Before our work (Boldyreva et al. in Cryptology ePrint Archive, Report 2003/096, 2003) appeared, no precise definitions or proven-secure schemes had been provided. In this paper, we formalize a notion of security for proxy signature schemes and present provably-secure schemes. We analyze the security of the well-known delegation-by-certificate scheme and show that after some slight but important modifications, the resulting scheme is secure, assuming the underlying standard signature scheme is secure. We then show that employment of aggregate signature schemes permits bandwidth savings. Finally, we analyze the proxy signature scheme of Kim, Park and Won, which offers important performance benefits. We propose modifications to this scheme which preserve its efficiency and yield a proxy signature scheme that is provably secure in the random-oracle model, under the discrete-logarithm assumption.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
A. Bakker, M. Steen, A.S. Tanenbaum, A law-abiding peer-to-peer network for free-software distribution, in IEEE International Symposium on Network Computing and Applications (NCA’01) (2001)
M. Bellare, G. Neven, Multi-signatures in the plain public-key model and a general forking lemma, in CCS ’06 (ACM, New York, 2006), pp. 390–399
M. Bellare, G. Neven, Multi-signatures in the plain public-key model and a generalized forking lemma, in CCS ’06 (ACM, New York, 2006)
M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in First ACM Conference on Computer and Communications Security (ACM, New York, 1993)
M. Bellare, C. Namprempre, G. Neven, Unrestricted aggregate signatures, in ICALP ’07 (2007)
M. Blaze, M. Strauss, Atomic proxy cryptography, in Eurocrypt ’98. LNCS (1998)
A. Boldyreva, A. Palacio, B. Warinschi, Secure proxy signature schemes for delegation of signing rights. Cryptology ePrint Archive, Report 2003/096 (2003)
D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in Eurocrypt ’03, ed. by E. Biham, LNCS, vol. 2656 (2003)
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in Asiacrypt ’01, ed. by C. Boyd. LNCS, vol. 2248 (2001)
Z. Dong, S. Liu, K. Chen, Cryptanalysis of B.Lee-S.Kim-K.Kim proxy signature. Progress on Cryptography (2004). ISBN: 978-1-4020-7986-3
I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in CCS ’98 (1998)
G. Fuchsbauer, D. Pointcheval, Anonymous consecutive delegation of signing rights: Unifying group and proxy signatures. Cryptology ePrint Archive, Report 2008/037 (2008)
H. Ghodosi, J. Pieprzyk, Repudiation of cheating and non-repudiation of Zhang’s proxy signature schemes, in ACISP ’99 (Springer, Berlin, 1999)
S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)
J. Herranz, G. Saez, Revisiting fully distributed proxy signature schemes. Cryptology ePrint Archive, Report 2003/197 (2003)
J. Herranz, G. Saez, Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures, in Financial Cryptography ’03. LNCS (Springer, Berlin, 2003)
A. Ivan, Y. Dodis, Proxy cryptography revisited, in NDSS ’03 (2003)
S. Kim, S. Park, D. Won, Proxy signatures, revisited, in ICICS ’97. LNCS, vol. 1334 (1997)
H. Kim, J. Baek, B. Lee, K. Kim, Secret computation with secrets for mobile agent using one-time proxy signature, in Cryptography and Information Security ’01 (2001)
S. Lal, A.K. Awasthi, Proxy blind signature scheme. Cryptology ePrint Archive, Report 2003/072 (2003)
S. Lal, A.K. Awasthi, A scheme for obtaining a warrant message from the digital proxy signatures. Cryptology ePrint Archive, Report 2003/073 (2003)
B. Lee, H. Kim, K. Kim, Strong proxy signature and its applications, in SCIS (2001)
J. Lee, J. Cheon, S. Kim, An analysis of proxy signatures: Is a secure channel necessary?, in CT-RSA ’03, ed. by M. Joye. LNCS, vol. 2612 (2003)
N.-Y. Lee, T. Hwang, C.-H. Wang, On Zhang’s nonrepudiable proxy signature schemes, in ACISP ’98 (1999)
J. Leiwo, C. Hanle, P. Homburg, A.S. Tanenbaum, Disallowing unauthorized state changes of distributed shared objects, in SEC (2000), pp. 381–390
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, B. Waters, Sequential aggregate signatures and multisignatures without random oracles, in Advances in Cryptology—EUROCRYPT ’06, vol. 4004, ed. by S. Vaudenay (2006), pp. 465–485
J. Lv, J. Liu, X. Wang, Further cryptanalysis of some proxy signature schemes. Cryptology ePrint Archive, Report 2003/111 (2003)
A. Lysyanskaya, S. Micali, L. Reyzin, H. Shacham, Sequential aggregate signatures from trapdoor permutations, in Advances in Cryptology—EUROCRYPT ’04, vol. 3027, ed. by C. Cachin, J. Camenisch (2004), pp. 74–90
T. Malkin, S. Obana, M. Yung, The hierarchy of key evolving signatures and a characterization of proxy signatures, in Eurocrypt ’04. LNCS (2004)
M. Mambo, K. Usuda, E. Okamoto, Proxy signatures for delegating signing operation, in CCS ’96 (ACM, New York, 1996)
A. Menezes, P.C. van Oorschot, S. Vanstone, Handbook of Applied Cryptography (CRC Press, Boca Raton, 1997)
B.C. Neuman, Proxy based authorization and accounting for distributed systems, in Proceedings of the 13th International Conference on Distributed Computing Systems (1993), pp. 283–291
T. Okamoto, M. Tada, E. Okamoto, Extended proxy signatures for smart cards, in ISW ’99. LNCS, vol. 1729 (Springer, Berlin, 1999)
H.-U. Park, L.-Y. Lee, A digital nominative proxy signature scheme for mobile communications, in ICICS ’01. LNCS, vol. 2229 (2001)
H. Petersen, P. Horster, D. P. Horsterm Self-certified keys—concepts and applications, in Proc. Communications and Multimedia Security’97 (Chapman & Hall, London, 1997), pp. 102–116
D. Pointcheval, J. Stern, Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
C.P. Schnorr, Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)
J.C. Schuldt, K. Matsuura, K.G. Paterson, Proxy signatures secure against proxy key exposure, in PKC ’08 (2008)
K. Shum, V.-K. Wei, A strong proxy signature scheme with proxy signer privacy protection, in WET ICE ’02 (2002)
H.M. Sun, An efficient nonrepudiable threshold proxy signature scheme with known signers. Comput. Commun. 22(8), 717–722 (1999)
H.M. Sun, On the design of time-stamped proxy signatures with traceable receivers, in IEE Proceedings—Computers and Digital Techniques (2000)
H.-M. Sun, B.-T. Hsieh, Remarks on two nonrepudiable proxy signature schemes, in Ninth National Conference on Information Security, vols. 241–246 (1999)
H.-M. Sun, B.-T. Hsieh, On the security of some proxy signature schemes. Cryptology ePrint Archive, Report 2003/068 (2003)
H. Sun, N.-Y. Lee, T. Hwang, Threshold proxy signatures, in IEE Proceedings—Computers and Digital Techniques, vol. 146 (1999), pp. 259–263
Z. Tan, Z. Liu, Provably secure delegation-by-certification proxy signature schemes, in 3rd International Conference on Information Security (2004)
V. Varadharajan, P. Allen, S. Black, An analysis of the proxy problem in distributed systems, in Proceedings of 1991 IEEE Computer Society Symposium on Research in Security and Privacy (1991), pp. 255–275
G. Wang, F. Bao, J. Zhou, R.H. Deng, Security analysis of some proxy signatures. Cryptology ePrint Archive, Report 2003/196 (2003)
H. Wang, J. Pieprzyk, Efficient one-time proxy signatures, in Asiacrypt ’03. LNCS, vol. 2894 (2003), pp. 507–522
C.-K. Wu, V. Varadharajan, Modified Chinese Remainder Theorem and its application to proxy signatures, in ICPP Workshop (1999)
S.-M. Yen, C.-P. Hung, Y.-Y. Lee, Remarks on some proxy signature schemes, in Workshop on Cryptology and Information Security, 2000 ICS (2000)
K. Zhang, Nonrepudiable proxy signature schemes. Manuscript, Available at http://citeseer.nj.nec.com/360090.html (1997)
K. Zhang, Threshold proxy signature schemes, in International Information Security Workshop (1997)
F. Zhang, R. Safavi-Naini, C.-Y. Lin, New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing. Cryptology ePrint Archive, Report 2003/104 (2003)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by Kenneth G. Paterson.
Rights and permissions
About this article
Cite this article
Boldyreva, A., Palacio, A. & Warinschi, B. Secure Proxy Signature Schemes for Delegation of Signing Rights. J Cryptol 25, 57–115 (2012). https://doi.org/10.1007/s00145-010-9082-x
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00145-010-9082-x