
Table 1: Entries in a Proxy Memo
Identity of delegator: (name, staff id, certificate id)
Identity of delegate: (name, staff id, certificate id)
Delegated rights: Signing and/or Decryption
Permission to re-delegate: Yes or No
Delegation period: (from date/time to date/time)
Maximum extension days: 0 or above
(other information)
she is not able to resume duty on time and would like
B to act on the position for a few more days, A should
have specified the “maximum extension days” to, say,
three days, so when the end of period approaches, B
can log in the DelSvr and request extension of power.
A new key for the extension period will be generated
for him. However, B is not able to request extension
after the signing power is expired, even though A has
specified the “maximum extension days”. When A
comes back, he simply revokes B’s signing key (ex-
tension period) if it is not the end of the extension
period. If A does not want any extension, he can set
the “maximum extension period” to zero.
The issuance of a new decryption key pair is the
similar to above except that A should change or in-
clude “decryption” in the delegated rights. All users
are required to query DelSvr for the most up-to-date
delegation status. Suppose a sender, S, wants to send
encrypted documents to A but noted that B is acting
on A’s behalf, S may have to encrypt the document
with B new encryption key and send it to B. This
can be made transparent to the user by the application
layer of the system. B will then be able to decrypt S’s
document and respond immediately. After the delega-
tion period, B should share a copy of the new decryp-
tion key with A so that A can decrypt the encrypted
documents processed during the delegation period.
2. New key pair per person (NK2) This is similar
to the above for both signing and decryption except
that only one pair of keys will be generated per per-
son and it will be used at any circumstances of del-
egation (until expiry/revocation). The keys are of no
specific delegator and delegation period. The delega-
tion relation is recorded in DelDB when they are in
use. In this case, a delegate will not share the private
keys with the delegator.
For re-delegation (if the delegator approves this
by selecting the “re-delegation” option), B logs in
DelSvr and repeat the process. A new key pair will be
generated for the new delegate during the delegation
period. It should be noted that the delegation period
and rights for the new delegate should be within that
of B.
Issuance of Proxy Memo
A Proxy Memo (the “Memo”) is an “object” which
acts as a proof delegation. It is like a digital form that
users have to fill information in it. Later it should be
signed by the delegator and received and used by one
or more delegate(s).
For creation of Proxy Memo, please refer to Che-
ung et al. (Cheung et al., 2004). The use of Memo for
delegation of decryption right has three alternatives:
1. Request to encrypt with DelSvr’s encryption
key (PMD1) When DelSvr knows a sender, S, wants
to encrypt a document to a recipient (A) who has del-
egated his/her decryption right (to B) during the pe-
riod, DelSvr will direct S to encrypt the document
with DelSvr’s encryption key. (S may reject the offer
if he did not intend to do so.) S encrypts the docu-
ment with DelSvr’s encryption key and send the doc-
ument to A. B receives the encrypted document (be-
cause of an email forwarding function by DelSvr) and
finds that it is encrypted with DelSvr’s encryption key.
B logs in DelSvr and presents both the Memo and
the encrypted document, after verification, DelSvr de-
crypts the document with its own decryption key and
re-encrypts the document with B’s encryption key.
The re-encrypted document is returned to B.
2. Request to encrypt with delegator’s en-
cryption key (PMD2) To facilitate this function, A
should have submitted a copy of his decryption key
to DelSvr. S does not have to be aware whether A
has delegated his right to others. S just encrypts the
document with A’s public key and send the document
to A. B receives the document (because of an email
forwarding function by DelSvr) and knows that the
document is for A. B logs in DelSvr and presents
both the Memo and the encrypted document, similar
to the above, DelSvr decrypts and re-encrypts docu-
ment and returns it to B.
3. Request to encrypt with delegate’s encryption
key (PMD3) To cut the decryption and re-encryption
processes by DelSvr, DelSvr will instruct S to encrypt
the document with B’s encryption key. When B re-
ceives the encrypted document, he can decrypt it and
respond immediately.
To re-delegate the decryption right, B logs in
DelSvr and makes a re-delegation request similar to
the NK– schemes.
By using either PMS, NK1, or NK2 for the delega-
tion of signing right and either PMD1, PMD2, PMD3,
NK1, NK2 for the delegation of decryption right, we
can have 15 schemes. In the next section, we will an-
alyze these 15 schemes according to the set of identi-
fied requirements.
5 ANALYSIS OF THE SCHEMES
In this section, we are going to analyze the security
and functionality of the constructs of the schemes. A
summary of the analysis is given in Table 2. It should
ICEIS 2004 - INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION
76