An analysis of proxy signatures: Is a secure channel necessary?

107Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A proxy signature enables the original signer to delegate her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper, we discuss the necessity of a secure channel in proxy signatures. Though establishing a secure channel has much influence on the efficiency of the scheme, to the best of our knowledge, this topic has not been discussed before. All known proxy signatures used a secure channel to deliver a signed warrant except one which used a 3-pass weak blind signature. However, the KPW scheme [2] appeared to be secure without the secure channel. We think that our result can contribute to designing more efficient proxy signature scheme. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Lee, J. Y., Cheon, J. H., & Kim, S. (2003). An analysis of proxy signatures: Is a secure channel necessary? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2612, 68–79. https://doi.org/10.1007/3-540-36563-x_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free