Design of time-stamped proxy signatures with traceable receivers

Authors
Citation
Hm. Sun, Design of time-stamped proxy signatures with traceable receivers, IEE P-COM D, 147(6), 2000, pp. 462-466
Citations number
16
Categorie Soggetti
Computer Science & Engineering
Journal title
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
ISSN journal
13502387 → ACNP
Volume
147
Issue
6
Year of publication
2000
Pages
462 - 466
Database
ISI
SICI code
1350-2387(200011)147:6<462:DOTPSW>2.0.ZU;2-3
Abstract
A proxy signature scheme is a method which allows an original signer to del egate his signing power to a proxy signer, Most proxy signature schemes use a warrant appearing in the signature verification equation to declare the valid delegation period. However, the declaration in the warrant is useless because no-one can know the exact time when the proxy signer signed a mess age. To avoid the proxy signer abusing the signing capability, the original signer may hope to know the identity of who received the proxy signature f rom the proxy signer. Recently Sun and Chen proposed the concept of time-st amped proxy signatures with traceable receivers to solve these two problems . A time-stamped proxy signature scheme with traceable receivers is a proxy signature scheme which can ascertain whether a proxy signature is created during the delegation period and can trace who actually received the proxy signatures from the proxy signer. The author shows that Sun and Chen's sche me suffers from weaknesses and consequently proposes a new time-stamped pro xy signature scheme which doesn't suffer from the same weaknesses.