TY - JOUR
T1 - Efficient proxy signatures based on trapdoor hash functions
AU - Chandrasekhar, S.
AU - Chakrabarti, S.
AU - Singhal, M.
AU - Calvert, K. L.
PY - 2010/12
Y1 - 2010/12
N2 - Proxy signatures have found extensive use in authenticating agents acting on behalf of users in applications such as grid computing, communications systems, personal digital assistants, information management and e-commerce. Importance of proxy signatures has been repeatedly highlighted by applied cryptographers through different variations, namely threshold proxy signatures, blind proxy signatures and so forth. Unfortunately, most recent constructions of proxy signatures only improve on minor weaknesses of previously built schemes, and most often do not deliver formal security guarantees. In this study, the authors propose a technique to construct provably secure proxy signature schemes using trapdoor hash functions that can be used to authenticate and authorise agents acting on behalf of users in agent-based computing systems. They demonstrate the effectiveness of their approach for creating practical instances by constructing a discrete log-based instantiation of the proposed generic technique that achieves superior performance in terms of verification overhead and signature size compared with existing proxy signature schemes. Formal definitions, security specifications and a detailed theoretical analysis, including correctness, security and performance, of the proposed proxy signature scheme have been provided.
AB - Proxy signatures have found extensive use in authenticating agents acting on behalf of users in applications such as grid computing, communications systems, personal digital assistants, information management and e-commerce. Importance of proxy signatures has been repeatedly highlighted by applied cryptographers through different variations, namely threshold proxy signatures, blind proxy signatures and so forth. Unfortunately, most recent constructions of proxy signatures only improve on minor weaknesses of previously built schemes, and most often do not deliver formal security guarantees. In this study, the authors propose a technique to construct provably secure proxy signature schemes using trapdoor hash functions that can be used to authenticate and authorise agents acting on behalf of users in agent-based computing systems. They demonstrate the effectiveness of their approach for creating practical instances by constructing a discrete log-based instantiation of the proposed generic technique that achieves superior performance in terms of verification overhead and signature size compared with existing proxy signature schemes. Formal definitions, security specifications and a detailed theoretical analysis, including correctness, security and performance, of the proposed proxy signature scheme have been provided.
UR - http://www.scopus.com/inward/record.url?scp=78650397997&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650397997&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs.2009.0204
DO - 10.1049/iet-ifs.2009.0204
M3 - Article
AN - SCOPUS:78650397997
SN - 1751-8709
VL - 4
SP - 322
EP - 332
JO - IET Information Security
JF - IET Information Security
IS - 4
ER -