By Topic

New proxy signature scheme with message recovery using verifiable self-certified public keys

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Tiwari, N. ; Dept. of Math., Motilal Nehru Nat. Inst. of Technol., Allahabad, India ; Padhye, S.

A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. In this paper, we present a new proxy signature scheme with message recovery using verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. Proposed scheme is secure against several active attacks and forgery attacks also. Another advantage of the proposed scheme is that the use of verifiable self-certified public key overcomes the weakness of repudiability of the self-certified public key and accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer.

Published in:

Computer and Communication Technology (ICCCT), 2011 2nd International Conference on

Date of Conference:

15-17 Sept. 2011