proxy private key are different from Alice’e standard
signatures. However the proxy signer can sign any
message of his choice i.e there is no limit on the range
of messages he can sign. This limitation is eliminated
in delegation by warrant schemes by adding a warrant
that specifies what kind of messages are delegated and
may contain the identities of Alice and Bob, the dele-
gation period, etc.
Followed by the first constructions given in
(M. Mambo and Okamoto, 1996; M. Mambo, 1996),
a number of new schemes and improvements have
been proposed (S. Kim and Won., 1997; Zhang.,
1997; Zhang, 1997; N.-Y. Lee and Wang, 1998; Gho-
dosi and Pieprzyk, 1999; T. Okamoto and Okamoto,
1999; B. Lee and Kim, 2001b; B. Lee and Kim,
2001a; Park and Lee, 2001; J.-Y. Lee and Kim, 2003;
Wang and Pieprzyk., 2003; A. Boldyreva and Warin-
schi, 2003); however, most of them do not fully meet
the security requirements of a proxy signature scheme
(see Section 2) . In (S. Kim and Won., 1997), Kim,
Park and Won proposed a threshold proxy signature,
in which the original signing power is shared among
a delegated group of n proxy signers such that only
t or more of them can generate proxy signatures co-
operatively. In (B. Lee and Kim, 2001b), Lee, Kim
and Kim proposed non-designated proxy signature in
which a warrant does not designate the identity of a
proxy signer so any possible proxy signer can respond
to this delegation and become a proxy signer. Fur-
thermore, their scheme is used to design secure mo-
bile agents in electronic commerce setting (B. Lee and
Kim, 2001a). One-time proxy signatures are studied
in (Ai-Ibrahim and Cerny, 2003; Wang and Pieprzyk.,
2003). In (J.-Y. Lee and Kim, 2003), Lee, Cheon,
and Kim investigated whether a secure channel for
delivery of a signed warrant is necessary in existing
schemes. Their results show that if the secure channel
is not provided, the MUO scheme (M. Mambo and
Okamoto, 1996) and the LKK scheme (B. Lee and
Kim, 2001b; B. Lee and Kim, 2001a) are insecure. To
remove the requirement of a secure channel and over-
come some other weaknesses, they revised the MUO
and LKK schemes (M. Mambo and Okamoto, 1996;
M. Mambo, 1996; B. Lee and Kim, 2001b). In con-
trast to the above mentioned schemes, which all are
based on discrete logarithm cryptosystems, several
RSA-based proxy signature schemes are proposed in
(T. Okamoto and Okamoto, 1999; B. Lee and Kim,
2001a). In (Zhen Chuan Chai, 2004) a factorisation
based forward-secure proxy signature scheme is pro-
posed. The scheme is based on the forward-secure
scheme of Abdalla and Reyzin.
In (Guilin Wang, 2004) a proxy signature scheme
with multiple original signers suitable for wireless
electronic commerce applications is proposed. When
compared to this scheme, our scheme has the property
of forward-security (this enables the proxy signer to
guarantee the security of messages signed in the past
even if his secret key is exposed today) and the proxy
signer will be delegated with signing power only for
a time period T . After the elapse of this time period,
the proxy signer will automatically be revoked.
We consider a scenario where there is need for a
single person to take up the responsibilities of many
persons for some duration and work on their behalf so
that the regular work goes on smoothly. For example
in a bank, an accountant may need to play the role of
a cashier, asst. manager and cheque clearing officer.
In such situations the employee working on behalf of
other employees need to be delegated with signing
power from the employees who perform the activities
regularly. This can be addressed using regular proxy
signatures. In terms of proxy signatures, the prob-
lem we have considered requires a single proxy signer
to sign on behalf of multiple original signers. Regu-
lar proxy signature force the proxy signer to generate
separate proxy key pair for each original signer. In the
scheme we propose the proxy signer just computes a
single proxy key pair for n original signers. Also, as
digital signatures, proxy signatures are also vulnera-
ble to leakage of proxy secret key. If the proxy secret
key is compromised, any message can be forged. To
prevent future forgery of signatures, the concept of
forward-security (Anderson, 1997) can be used (see
section 3). We use the property of forward-security
and apply it to proxy signatures. We therefore pro-
pose a new Forward-secure proxy signature and revo-
cation scheme for a proxy signer with multiple orig-
inal signers which is based on the popular Forward-
secure Bellare-Miner scheme (Bellare, 1999). The
scheme has the following features:
• The scheme is based on Forward-secure Bellare-
Miner scheme.
• Multiple original signers can delegate signing
power to a single proxy signer.
• Proxy signer is capable of signing on behalf of
original signers only for a time period T , after
which he is revoked as a proxy signer.
• Identity of the proxy signer is available in the in-
formation sent by original signer to proxy signer.
• Secure channel is not required to send the infor-
mation to proxy signer.
• There is a facility to send warrant messages to
proxy signer and verifier.
• Original signer cannot play the role of proxy
signer.
SECRYPT 2008 - International Conference on Security and Cryptography
246