Research Article
Further Study on Proxy Authorization and Its Scheme
@INPROCEEDINGS{10.1007/978-3-642-02469-6_48, author={Xuanwu Zhou and Yang Su and Ping Wei}, title={Further Study on Proxy Authorization and Its Scheme}, proceedings={Complex Sciences. First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009, Revised Papers, Part 2}, proceedings_a={COMPLEX PART 2}, year={2012}, month={5}, keywords={Proxy authorization multi-party authorization multicast communi-cation forward security BAN logic}, doi={10.1007/978-3-642-02469-6_48} }
- Xuanwu Zhou
Yang Su
Ping Wei
Year: 2012
Further Study on Proxy Authorization and Its Scheme
COMPLEX PART 2
Springer
DOI: 10.1007/978-3-642-02469-6_48
Abstract
Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multi-party proxy authorization scheme, a group of n members can cooperate to entrust their right, and the authorizing right can be supervised by secret sharing mechanism. In the second multicast proxy authorization scheme, the members can entrust their right in multicast mode. The multicasting design strategy prevents coalition attack, avoids the problem of generalized signature forgery. In the last conditionally anonymous scheme, the identity blinding algorithm enables the proxy signer to be anonymous and the anonymity can also be revoked if necessary. This design strategy avoids the misuse of proxy authorization and renders effective supervision on signature entrusting and proxy signing.