Authentication in multi-tier systems using proxy signatures
Prikladnaâ diskretnaâ matematika, no. 4 (2010), pp. 18-22.

Voir la notice de l'article provenant de la source Math-Net.Ru

Two authentication protocols for multi-tier system based on proxy signatures are provided. Implementation of these protocols using certificates is considered. In the first protocol, proxy signature is only used for the authentication of a client, but in the second one, it is also used for the authentication of requests inside the system. This makes the second protocol more secure.
Keywords: multi-tier systems, authentication, proxy signature.
@article{PDM_2010_4_a1,
     author = {P. A. Pautov},
     title = {Authentication in multi-tier systems using proxy signatures},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {18--22},
     publisher = {mathdoc},
     number = {4},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/}
}
TY  - JOUR
AU  - P. A. Pautov
TI  - Authentication in multi-tier systems using proxy signatures
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 18
EP  - 22
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/
LA  - ru
ID  - PDM_2010_4_a1
ER  - 
%0 Journal Article
%A P. A. Pautov
%T Authentication in multi-tier systems using proxy signatures
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 18-22
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/
%G ru
%F PDM_2010_4_a1
P. A. Pautov. Authentication in multi-tier systems using proxy signatures. Prikladnaâ diskretnaâ matematika, no. 4 (2010), pp. 18-22. http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/

[1] Pautov P. A., “Autentifikatsiya v modeli doverennoi podsistemy na osnove kommutativnogo shifrovaniya”, Prikladnaya diskretnaya matematika, 2010, no. 3, 90–95

[2] Mambo M. M., Usuda K., Okamoto E., “Proxy Signatures: Delegation of the Power to Sign Message”, IEICE Transaction Fundamentals, E79-A:9 (1996), 1338–1353

[3] Boldyreva A., Palacio A., Warinschi B., Secure Proxy Signature Schemes for Delegation of Signing Rights, , 2003 http://eprint.iacr.org/2003/096.pdf

[4] Tan Z., Liu Z., “Provably Secure Delegation-by-Certification Proxy Signature Schemes”, InfoSecu' 04, Proceedings of the 3rd International Conference on Information security, 2004, 38–43