Some proxy signature protocols
Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 70-77.

Voir la notice de l'article provenant de la source Math-Net.Ru

An improvement proxy signature scheme by authors J.-Y. Lee, J.-H. Cheon and S. Kim is proposed. Under this improvement, the scheme does not allow parties to create proxy private key independently. A group proxy signature scheme is suggested too. It can be used for the implementation of voting procedures.
Keywords: digital signatures, proxy signatures, security analysis, voting
Mots-clés : group signature.
@article{PDM_2011_1_a4,
     author = {E. A. Tolyupa},
     title = {Some proxy signature protocols},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {70--77},
     publisher = {mathdoc},
     number = {1},
     year = {2011},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/}
}
TY  - JOUR
AU  - E. A. Tolyupa
TI  - Some proxy signature protocols
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2011
SP  - 70
EP  - 77
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/
LA  - ru
ID  - PDM_2011_1_a4
ER  - 
%0 Journal Article
%A E. A. Tolyupa
%T Some proxy signature protocols
%J Prikladnaâ diskretnaâ matematika
%D 2011
%P 70-77
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/
%G ru
%F PDM_2011_1_a4
E. A. Tolyupa. Some proxy signature protocols. Prikladnaâ diskretnaâ matematika, no. 1 (2011), pp. 70-77. http://geodesic.mathdoc.fr/item/PDM_2011_1_a4/

[1] Mambo M., Usuda K., Okamoto E., “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, E79-A:9 (1996), 1338–1353

[2] Mambo M., Usuda K., Okamoto E., “Proxy signatures for delegating signing operation”, Proc. of 3rd ACM Conference on Computer and Communications Security, CCS' 96, ACM Press, 1996, 48–57

[3] Kim S., Park S., Won D, “Proxy signatures, revisited”, Information and Communications Security, ICICS' 97, LNCS, 1334, 1997, 223–232 | Zbl

[4] Lee B., Kim H., Kim K., “Strong proxy signature and its applications”, Proc. of the 2001 Symposium on Cryptography and Information Security, SCIS' 01 (Oiso, Japan, Jan. 23–26, 2001), V. 2/2, 603–608 | Zbl

[5] Lee J.-Y., Cheon J.-H., Kim S., “An analysis of proxy signatures: Is a secure channel necessary?”, LNCS, 2612, 2003, 68–79 | MR | Zbl

[6] Wang G., Bao F., Zhou J., Deng R. H., “Security Analysis of Some Proxy Signatures”, LNCS, 2971, 2004, 305–319 | MR | Zbl