Proxy Blind Signature Scheme

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Anonymity without Sacrificing Performance Enhanced Nymble System with Distributed Architecture CS 858 Project Presentation Omid Ardakanian * Nam Pham *
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
1 Chapter 7-2 Signature Schemes. 2 Outline [1] Introduction [2] Security Requirements for Signature Schemes [3] The ElGamal Signature Scheme [4] Variants.
A Pairing-Based Blind Signature
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Security analysis of an enhanced authentication key exchange protocol Authors : H.Y. Liu, G.B. Horng, F.Y. Hung Presented by F.Y. Hung Date : 2005/5/20.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
A New Multi-Proxy Multi- Signature Scheme Source: National Computer Symposium, vol. F, Taiwan, pp , 2001 Author: Shin-Jia Hwang and Chiu-Chin Chen.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
Identity Base Threshold Proxy Signature Jing Xu, Zhenfeng Zhang, and Dengguo Feng Form eprint Presented by 魏聲尊.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Chapter 13 Digital Signature
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
1 Signature scheme based on the root extraction problem over braid groups B.C. Wang, Y.P. Hu IET Information security 2009, Vol 3, Iss 2, pp
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Overview Modern public-key cryptosystems: RSA
Non-PKI Methods for Public Key Distribution
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Lightweight Mutual Authentication for IoT and Its Applications
Cryptography: an overview
CS580 Internet Security Protocols
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Author : Guilin Wang Source : Information Processing Letters
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A new ring signature scheme with signer-admission property
A secure and traceable E-DRM system based on mobile device
An efficient threshold RSA digital signature scheme
Certificateless signature revisited
CS480 Cryptography and Information Security
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Efficient Time-Bound Hierarchical Key Assignment Scheme
Improving Lamport One-time Signature Scheme
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Digital Signatures…!.
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Key Management Network Systems Security
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A New Provably Secure Certificateless Signature Scheme
Chapter 13 Digital Signature
Cryptology Design Fundamentals
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Cryptanalysis of Tseng et al.’s authenticated encrption schemes
Published in 2016 International Computer Symposium (ICS) Authors
A Distributed Sign-and-Encryption for Anonymity
Digital Signatures Network Security.
Privacy Protection for E-Health Systems by
Presentation transcript:

Proxy Blind Signature Scheme Author: Sunder Lai , Amit Kumar Awasthi Source: Journal of Information Science and Engineering Date: Dec/3/2003 Speaker: 陳東怡

Outline Introduction Proposed Scheme Efficiency Security Analysis Conclusion

Introduction Blind signature: Proxy blind signature: User C can obtain signature of A on any given message without revealing any information of the message Proxy blind signature: The original singer A delegates his signature authority to proxy singer B in such a way B can sign any message on behalf of the original A

Introduction Proxy unprotected: Proxy protected: Proxy and original singer can both generate a valid proxy signature Proxy protected: Only proxy can generate a valid signature Original A Signature Authority Proxy blind signature Proxy B User C

Proposed Scheme Notations:

Proposed Scheme (cont.) Proxy phase 1. Proxy Generation Choose and compute 2. Proxy Delivery The original singer sends (s, r ) to a proxy B in a secure way and makes public

Proposed Scheme (cont.) 3. Proxy Verification Verify if if (s ,r) satisfies this congruence, B accepts it as a valid proxy, otherwise rejects it. Signing phase 1. B choose a random num computes and sends it to the receiver C

Proposed Scheme (cont.) 2. C choose randomly and computes and sends e to B 3. After receiving e, B computes and sends it to C 4. Now C computes The tuple (m, Sp, e’ ) is the proxy blind signature

Proposed Scheme (cont.) Verification phase The verifier of the proxy blind signature computes Here e’’ = e’ if the tuple (m, Sp, e) is a valid proxy signature

Proposed Scheme (cont.) Proxy protected case Proxy phase 1. Proxy Generation Choose and compute 2. Proxy Delivery The original singer sends (s, r ) to a proxy B in a secure way and makes public

Proposed Scheme (cont.) 3. Proxy Verification and key alternation After confirming the validity of the pair (σ ,r) B alters the proxy key as The Signing phase and the Verification phase are same as in the proxy unprotected case

Efficiency Phase Total Proxy generation Signature generation Signature verification 4E+2M 3E+3M+2I 2E+M 9E+6M+2I where E denotes Exponential computation, M denotes Multiplication load , I denotes Inversion

Security Analysis With different congruence, the original signature and the proxy signature can be distinguished. It is impossible to create a valid proxy signature without knowing xB or s or both. Original signer cannot deny his agreement because yp is computed from ya.

Conclusion A proxy blind signature scheme with which a proxy user is able to make proxy blind signature and verifier may verify it very similar to proxy signature schemes.