[6660] in cryptography@c2.net mail archive
proxy signatures
daemon@ATHENA.MIT.EDU (Arrianto Mukti Wibowo)
Fri Feb 25 09:17:58 2000
Message-ID: <007701bf7f3f$6b7414a0$ed3d8489@muki>
Reply-To: "Arrianto Mukti Wibowo" <iscp9063@nus.edu.sg>
From: "Arrianto Mukti Wibowo" <iscp9063@nus.edu.sg>
To: "Cryptography" <cryptography@c2.net>
Date: Fri, 25 Feb 2000 11:20:15 +0800
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Hi...
I'm a research student studying crypto (newbies).
I really need a paper, which I can not get:
Masahiro Mambo, Usada & Eiji Okamoto "Proxy Signatures" Proceedings of the
1995 Symposium
on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24-27
Jan 1995.
I've mailed two of the authors, though.
1/ Just in case anyone knows where to download or "request" the paper from
the Internet, pls let me kow.
2/ Does anyone know other "variants of proxy signatures"? Here's a little
description:
- While Alice is not around, Bob on behalf of Alice, can sign for Alice (a
proxy signature). Thus Alice 'delegates' herself to Bob.
- The signature should be distinguishable from normal signatures
- Only the original signer and the designater proxy signer can create a
valid proxy signature (actually, I don't the original signer to be able to
create a proxy signature. Anyway its my problem)
- A proxy signer (bob) cannot create a valid proxy signature not detected as
proxy signature
- Verifier can be convinced of Alice's agreement in the signed message
- Original signer can determine the proxy signer's identity from a proxy
signature
- a proxy signer cannot disavoe an accepted proxy signature he created.
BTW, it's not in Schneier's crypto paper links, although it is mentioned in
his book, ref 1001.
Thanxalot,
-mukti