Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16]

@

Journal of Information Science and Engineering, Vol. 22 No. 4, pp. 965-973 (July 2006)

Design of Proxy signature in the Digital Signature Algorithm (DSA)*

I-Te Chen1, Ming-Hsin Chang2 and Yi-Shiung Yeh1
1Department of Computer Science and Information Engineering
National Chiao-Tung University
Hsinchu, 300 Taiwan
2Chunghwa Telecom Laboratories

The proxy signature has been deployed in many applications. Unfortunately, most of the proxy signature schemes, which have been proposed up to now, are not based on standard signature such as Digital Signature Algorithm (DSA). Consequently, those proposals have inevitably been considered infeasible because of obvious security weaknesses so they suffer from new attacks. In fact, with the application of standard signature like DSA, which has been fully discussed, a proxy signature scheme could be well accepted for the deployment in many applications. Therefore, we propose a new proxy signature scheme which combines the DSA properties with proxy signatures. In other words, our scheme keeps not only the properties of the DSA but also fulfills the requirements of proxy signatures. We hope our new proxy signature based on DSA combining Public-key infrastructure (PKI) mechanism could be used in practice as well as the conventional DSA.

Keywords: proxy signature, DSA, PKI, cryptography, indistinguishable

Full Text () Retrieve PDF document (200607_15.pdf)

Received May 19, 2004; revised February 17 & May 10, 2004; accepted June 20, 2005.
Communicated by Ja-Ling Wu.
* This paper was partially supported by NSC 93-2213-E-009-033.