Complex Sciences. First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009, Revised Papers, Part 2

Research Article

Further Study on Proxy Authorization and Its Scheme

Download
428 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-02469-6_48,
        author={Xuanwu Zhou and Yang Su and Ping Wei},
        title={Further Study on Proxy Authorization and Its Scheme},
        proceedings={Complex Sciences. First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009, Revised Papers, Part 2},
        proceedings_a={COMPLEX PART 2},
        year={2012},
        month={5},
        keywords={Proxy authorization multi-party authorization multicast communi-cation forward security BAN logic},
        doi={10.1007/978-3-642-02469-6_48}
    }
    
  • Xuanwu Zhou
    Yang Su
    Ping Wei
    Year: 2012
    Further Study on Proxy Authorization and Its Scheme
    COMPLEX PART 2
    Springer
    DOI: 10.1007/978-3-642-02469-6_48
Xuanwu Zhou1,*, Yang Su1, Ping Wei1
  • 1: Engineering College of the APF, Email: schwoodchow@163.com
*Contact email: wjxuanwu@163.com

Abstract

Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multi-party proxy authorization scheme, a group of n members can cooperate to entrust their right, and the authorizing right can be supervised by secret sharing mechanism. In the second multicast proxy authorization scheme, the members can entrust their right in multicast mode. The multicasting design strategy prevents coalition attack, avoids the problem of generalized signature forgery. In the last conditionally anonymous scheme, the identity blinding algorithm enables the proxy signer to be anonymous and the anonymity can also be revoked if necessary. This design strategy avoids the misuse of proxy authorization and renders effective supervision on signature entrusting and proxy signing.