Authors: Hassan M. Elkamchouchi; Yasmine Abouelseoud; Wafaa S. Shouaib
Addresses: Electrical Engineering Department, Faculty of Engineering, Alexandria University, P.O. Box 21544, Elshatby, Alexandria City, Egypt. ' Mathematics and Physics Department, Faculty of Engineering, Alexandria University, P.O. Box 21544, Elshatby, Alexandria City, Egypt. ' Electrical Engineering Department, Omar El-Moukhtar University, P.O. Box 991, Al-Bayda City, Libya
Abstract: In this paper, a new proxy signcryption scheme is proposed suitable for use by resource constrained devices such as pagers and mobile phones. The proposed scheme is based on delegating the signing rights of the original signer to one of his proxies using warrants. The use of warrants enables explicit specification of the signing rights of the proxy agent. The proxy agent and the original signer are assumed to be registered within the same traditional public key infrastructure. To offer a higher level of security, the proxy key is derived from the personal key of the proxy signer to prevent the proxy signer from denying a signature it created and protects it from framing attacks mounted by the original signer against it. We also consider a variant of our main scheme that works over elliptic curves since they have proven recently the possibility of reducing the key sizes.
Keywords: proxy signcryption; public key cryptography; elliptic curves; network security; resource constrained devices; pagers; mobile phones; cell phones; proxy agents.
International Journal of Intelligent Engineering Informatics, 2011 Vol.1 No.3/4, pp.309 - 327
Available online: 09 Dec 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article