A new proxy signcryption scheme using warrants Online publication date: Fri, 09-Dec-2011
by Hassan M. Elkamchouchi; Yasmine Abouelseoud; Wafaa S. Shouaib
International Journal of Intelligent Engineering Informatics (IJIEI), Vol. 1, No. 3/4, 2011
Abstract: In this paper, a new proxy signcryption scheme is proposed suitable for use by resource constrained devices such as pagers and mobile phones. The proposed scheme is based on delegating the signing rights of the original signer to one of his proxies using warrants. The use of warrants enables explicit specification of the signing rights of the proxy agent. The proxy agent and the original signer are assumed to be registered within the same traditional public key infrastructure. To offer a higher level of security, the proxy key is derived from the personal key of the proxy signer to prevent the proxy signer from denying a signature it created and protects it from framing attacks mounted by the original signer against it. We also consider a variant of our main scheme that works over elliptic curves since they have proven recently the possibility of reducing the key sizes.
Online publication date: Fri, 09-Dec-2011
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Intelligent Engineering Informatics (IJIEI):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org