[6660] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

proxy signatures

daemon@ATHENA.MIT.EDU (Arrianto Mukti Wibowo)
Fri Feb 25 09:17:58 2000

Message-ID: <007701bf7f3f$6b7414a0$ed3d8489@muki>
Reply-To: "Arrianto Mukti Wibowo" <iscp9063@nus.edu.sg>
From: "Arrianto Mukti Wibowo" <iscp9063@nus.edu.sg>
To: "Cryptography" <cryptography@c2.net>
Date: Fri, 25 Feb 2000 11:20:15 +0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Hi...

I'm a research student studying crypto (newbies).

I really need a paper, which I can not get:
Masahiro Mambo, Usada & Eiji Okamoto "Proxy Signatures" Proceedings of the
1995 Symposium
on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24-27
Jan 1995.

I've mailed two of the authors, though.

1/ Just in case anyone knows where to download or "request" the paper from
the Internet, pls let me kow.

2/ Does anyone know other "variants of proxy signatures"? Here's a little
description:
- While Alice is not around, Bob on behalf of Alice, can sign for Alice (a
proxy signature). Thus Alice 'delegates' herself to Bob.
- The signature should be distinguishable from normal signatures
- Only the original signer and the designater proxy signer can create a
valid proxy signature (actually, I don't the original signer to be able to
create a proxy signature. Anyway its my problem)
- A proxy signer (bob) cannot create a valid proxy signature not detected as
proxy signature
- Verifier can be convinced of Alice's agreement in the signed message
- Original signer can determine the proxy signer's identity from a proxy
signature
- a proxy signer cannot disavoe an accepted proxy signature he created.

BTW, it's not in Schneier's crypto paper links, although it is mentioned in
his book, ref 1001.

Thanxalot,

-mukti



home help back first fref pref prev next nref lref last post