Rashi Dhagat, Purvi Joshi
S.D. Bansal college of Technology, Indore
Content
 Introduction
 Proposed Work
 Layout of proposed work
 Proposed Algorithm
 Limitation and Future Work
 Conclusion
Introduction
• A digital signature scheme is a mathematical scheme
for demonstrating the authenticity of a digital message or
document.
• It addresses basic issues
 Authenticity
 Integrity
 Non-repudiation
• The main purpose of paper is enforce security to
digital document from the moment it leaves sender
until it reaches receiver.
19-Mar-16CDAN' 161
• In this paper, we define a method that uses another signer as
a proxy to sign the documents known as Proxy Signer.
• A nominative Proxy signature Scheme is the method that
the proxy signer generates the signature and transmit it to
verifier instead to original signer to verify.
• Only the verifier can verify the signature and third party
cannot know who the actual signer is. Therefore scheme
provide signer’s anonymity.
19-Mar-16CDAN' 162
Proposed System
• We describe a new proxy signature scheme with proxy signer
privacy protection.
• In this paper, we combine two delegation schemes first partial
delegation type and second delegation by certificate to
overcome the disadvantage of each other.
• The proxy warrant usually contains:
 Identity of the proxy signer,
 Valid period of delegation,
 Possible other restrictions on the signing capability delegated
to the proxy signer.
19-Mar-16CDAN' 163
19-Mar-16CDAN' 164
 Proposed scheme satisfy following properties:
 Verifiability
 Non-Repudiation
 Non-Designation
 Strong Identiability
I. Generation of Signed Warrant
II. Singing through Proxy signature
III. Verification of Proxy Signature
Three Phases of Proposed Scheme
19-Mar-16CDAN' 165
Layout of Proposed Scheme
19-Mar-16CDAN' 166
Notations used:
 M : Original Signer
 P : Proxy Signer
 g : an element of order b in Za
*
 h(.) : a hash function
 mW : the warrant issued by original signer M
 SM : key for proxy signer P, generated by original signer M
 X : key used by P for signing the message
 I : an integer in Z*b
 YM : original signer’s known key
 YP : proxy signer’s secret key
 k : an integer in Zb
*
 n : an integer in Zb
*
 s : key generated by delegator for the proxy
 t : hashed value
19-Mar-16CDAN' 167
Proposed Algorithm
1. Original Signer M choose its private key xM and publishes its public key
YM= gXM (mod a).
2. Original signer generates system parameters n= gk(mod a) and
SM= xM h(mw, n, k) (mod q).
3. Original Signer transfers these parameters (mw, n, k) to proxy signer
through secure channel.
4. Proxy Signer checks that SA = YM h(mw, n, k)(mod a). Otherwise refuse
the delegation.
5. Proxy signer generates proxy signature key
x= SM +XP h(mw, n, k)(mod a).
6. Proxy signer generates signature and compute u = gI (mod p)
7. Proxy signed message given as (t, mw; rM; y; IDM) where,
t = h(m, mw g x k (mw, n)) (mod a).
19-Mar-16CDAN' 168
Future Scope & Limitation
 The exact timing of delegation certificate is unable to state
when sign of document is created. No verifier can ensure the
date and time when the document is signed.
 The limitation is that there is no algorithm if the signer wants
to terminate its signing ability before delegation period.
Delegation only ends after the delegated time period.
19-Mar-16CDAN' 169
Conclusion
 Our scheme satisfies conditions of the Partial Delegation with
Warrant in Proxy Signature scheme and decreases its
consuming time and cost.
 This paper provides way to authenticate a message by using a
protective notion that uses a proxy agent that generate the sign
and confirms the information transmit on the channel.
 It uses its private key to sign the document because of that it
is easy to verify the signer and signer cannot deny after
signing the message. It uses a protected nominative signature
so that signer and proxy cannot false each other.
19-Mar-16CDAN' 1610
References
1. M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the
power, IEICE Trans. Fundamentals E79-A (9) (1996) pp. 1338 - 1353.
2. Zhang Jian-hong, Xu Yu-wei, Cui Yuan-bo, Chen Zhi-peng, Efficient
short proxy signature scheme based on multi-linear map, Elsevier, Vol. 2
2012, pp. 109 – 113.
3. Kim, S., Park, S., and Won, D.: Proxy Signatures, Revisited, in Proc. of
ICICS 1997, LNCS 1334, pp.223-232.
4. Zhang, K.: Threshold Proxy Signature Schemes, in Proc. of ISW’97,
Information Security Workshop, pp.191-197, 1997.
5. B. Lee, Heesun Kim, Kwangjo Kim” Secure Mobile Agent Using Strong
Non-designated Proxy Signature”, Information Security and Privacy
Volume 2119 of the series Lecture Notes in Computer Science pp 474-
486, July 2001.
19-Mar-16CDAN' 1611
6. L. H. Li, S. F. Tzeng and M. S. Hwang, Generalization of proxy
signature-based on discrete logarithms, Computers and Security,
vol.22, 2003, pp.245-255.
7. Javier Herranz and Germ´an S´aez ” Revisiting Fully Distributed
Proxy Signature Schemes” INDOCRYPT 2004, LNCS 3348,2004,
pp. 356–370.
8. A. Boldyreva, A. Palacio and B. Warinschi. “Secure proxy signature
schemes for delegation of signing rights” Manuscript available at
http://eprint.iacr.org/2003/096.
9. T. Malkin, S. Obana and M. Yung. The hierarchy of key evolving
signatures and a characterization of proxy signatures. In: Proceedings
of Eurocrypt’04, LNCS 3027, SpringerVerlag, 2004, pp. 306–322.
10. Z. Shao. Proxy signature schemes based on factoring. Information
Processing Letters, Vol. 85,2003, pp. 137–143.
19-Mar-16CDAN' 1612
Thank You !!

More Related Content

PPTX
Digital signature
PPT
Digital signature schemes
PPT
Dsa & Digi Cert
PDF
Electronic Signature
PDF
57 306-311
PDF
Blind Signature Scheme
PDF
New Secure Proxy Signature Scheme with Fault Tolerance Based On Factoring and...
PPSX
Digital signature
Digital signature
Digital signature schemes
Dsa & Digi Cert
Electronic Signature
57 306-311
Blind Signature Scheme
New Secure Proxy Signature Scheme with Fault Tolerance Based On Factoring and...
Digital signature

What's hot (20)

PPT
Introduction to Digital signatures
PPTX
Digital Signature Certificate
PDF
Digital signatures - A mathematical scheme for demonstrating the authenticity...
DOC
Dss digital signature standard and dsa algorithm
PDF
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
PPT
Digital signature algorithm (de la cruz, genelyn).ppt 2
PPT
Information and data security digital signatures
PPT
Digital signature
PPTX
Elgamal & schnorr digital signature scheme copy
PDF
Ao318992
PPT
Authentication Protocols
DOCX
53398506 10-case-study-digital-signature
PPT
Public Key Cryptography
PPT
What is digital signature or DSC
PPT
Digital signatures
PPT
Digital signature introduction
PPT
C08 crypto-digital signature13
PDF
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
PDF
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Introduction to Digital signatures
Digital Signature Certificate
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Dss digital signature standard and dsa algorithm
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
Digital signature algorithm (de la cruz, genelyn).ppt 2
Information and data security digital signatures
Digital signature
Elgamal & schnorr digital signature scheme copy
Ao318992
Authentication Protocols
53398506 10-case-study-digital-signature
Public Key Cryptography
What is digital signature or DSC
Digital signatures
Digital signature introduction
C08 crypto-digital signature13
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Ad

Viewers also liked (8)

PPT
Ypiresies mathiton sch_gr
ODP
Ppt2 onthephone
PDF
M2M communications
PDF
LTE MTC: Optimizing LTE Advanced for Machine Type Communications
PDF
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
PPT
Digital Communication
PPTX
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
PDF
The Physical Interface
Ypiresies mathiton sch_gr
Ppt2 onthephone
M2M communications
LTE MTC: Optimizing LTE Advanced for Machine Type Communications
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Digital Communication
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
The Physical Interface
Ad

Similar to Digitall signature update (20)

PDF
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
PDF
A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...
PDF
AN EFFICIENT AND SECURE DIGITAL MULTISIGNATURE PROTOCOL BASED ON ECC
PDF
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...
PDF
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
PPT
digital_sign_interview.ppt
PDF
Chaos Based Direct Public Verifiable Signcryption Scheme
PPT
Digital signature
PDF
Efficient authentication for mobile and pervasive computing
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
PDF
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
PDF
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
PPTX
Network Security Unit-2 topic Part-1.pptx
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
DOCX
Cost effective authentic and anonymous
DOCX
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PDF
Blind multi-signature scheme based on factoring and discrete logarithm problem
PPT
Cryptographysecurity 1222867498937700-9
PDF
561 1530-1-pb (1)
PDF
Guillou-quisquater protocol for user authentication based on zero knowledge p...
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
A Secure Proxy Signature Scheme with Fault Tolerance Based On Discrete Logari...
AN EFFICIENT AND SECURE DIGITAL MULTISIGNATURE PROTOCOL BASED ON ECC
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
digital_sign_interview.ppt
Chaos Based Direct Public Verifiable Signcryption Scheme
Digital signature
Efficient authentication for mobile and pervasive computing
Lightweight secure scheme for detecting provenance forgery and packet drop at...
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
Network Security Unit-2 topic Part-1.pptx
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cost effective authentic and anonymous
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Blind multi-signature scheme based on factoring and discrete logarithm problem
Cryptographysecurity 1222867498937700-9
561 1530-1-pb (1)
Guillou-quisquater protocol for user authentication based on zero knowledge p...

Recently uploaded (20)

PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Applications of Equal_Area_Criterion.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
Measurement Uncertainty and Measurement System analysis
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Information Storage and Retrieval Techniques Unit III
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Management Information system : MIS-e-Business Systems.pptx
First part_B-Image Processing - 1 of 2).pdf
Module 8- Technological and Communication Skills.pptx
Applications of Equal_Area_Criterion.pdf
Abrasive, erosive and cavitation wear.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Amdahl’s law is explained in the above power point presentations
CyberSecurity Mobile and Wireless Devices
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Unit1 - AIML Chapter 1 concept and ethics
Measurement Uncertainty and Measurement System analysis
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
mechattonicsand iotwith sensor and actuator
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx

Digitall signature update

  • 1. Rashi Dhagat, Purvi Joshi S.D. Bansal college of Technology, Indore
  • 2. Content  Introduction  Proposed Work  Layout of proposed work  Proposed Algorithm  Limitation and Future Work  Conclusion
  • 3. Introduction • A digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. • It addresses basic issues  Authenticity  Integrity  Non-repudiation • The main purpose of paper is enforce security to digital document from the moment it leaves sender until it reaches receiver. 19-Mar-16CDAN' 161
  • 4. • In this paper, we define a method that uses another signer as a proxy to sign the documents known as Proxy Signer. • A nominative Proxy signature Scheme is the method that the proxy signer generates the signature and transmit it to verifier instead to original signer to verify. • Only the verifier can verify the signature and third party cannot know who the actual signer is. Therefore scheme provide signer’s anonymity. 19-Mar-16CDAN' 162
  • 5. Proposed System • We describe a new proxy signature scheme with proxy signer privacy protection. • In this paper, we combine two delegation schemes first partial delegation type and second delegation by certificate to overcome the disadvantage of each other. • The proxy warrant usually contains:  Identity of the proxy signer,  Valid period of delegation,  Possible other restrictions on the signing capability delegated to the proxy signer. 19-Mar-16CDAN' 163
  • 6. 19-Mar-16CDAN' 164  Proposed scheme satisfy following properties:  Verifiability  Non-Repudiation  Non-Designation  Strong Identiability
  • 7. I. Generation of Signed Warrant II. Singing through Proxy signature III. Verification of Proxy Signature Three Phases of Proposed Scheme 19-Mar-16CDAN' 165
  • 8. Layout of Proposed Scheme 19-Mar-16CDAN' 166
  • 9. Notations used:  M : Original Signer  P : Proxy Signer  g : an element of order b in Za *  h(.) : a hash function  mW : the warrant issued by original signer M  SM : key for proxy signer P, generated by original signer M  X : key used by P for signing the message  I : an integer in Z*b  YM : original signer’s known key  YP : proxy signer’s secret key  k : an integer in Zb *  n : an integer in Zb *  s : key generated by delegator for the proxy  t : hashed value 19-Mar-16CDAN' 167
  • 10. Proposed Algorithm 1. Original Signer M choose its private key xM and publishes its public key YM= gXM (mod a). 2. Original signer generates system parameters n= gk(mod a) and SM= xM h(mw, n, k) (mod q). 3. Original Signer transfers these parameters (mw, n, k) to proxy signer through secure channel. 4. Proxy Signer checks that SA = YM h(mw, n, k)(mod a). Otherwise refuse the delegation. 5. Proxy signer generates proxy signature key x= SM +XP h(mw, n, k)(mod a). 6. Proxy signer generates signature and compute u = gI (mod p) 7. Proxy signed message given as (t, mw; rM; y; IDM) where, t = h(m, mw g x k (mw, n)) (mod a). 19-Mar-16CDAN' 168
  • 11. Future Scope & Limitation  The exact timing of delegation certificate is unable to state when sign of document is created. No verifier can ensure the date and time when the document is signed.  The limitation is that there is no algorithm if the signer wants to terminate its signing ability before delegation period. Delegation only ends after the delegated time period. 19-Mar-16CDAN' 169
  • 12. Conclusion  Our scheme satisfies conditions of the Partial Delegation with Warrant in Proxy Signature scheme and decreases its consuming time and cost.  This paper provides way to authenticate a message by using a protective notion that uses a proxy agent that generate the sign and confirms the information transmit on the channel.  It uses its private key to sign the document because of that it is easy to verify the signer and signer cannot deny after signing the message. It uses a protected nominative signature so that signer and proxy cannot false each other. 19-Mar-16CDAN' 1610
  • 13. References 1. M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power, IEICE Trans. Fundamentals E79-A (9) (1996) pp. 1338 - 1353. 2. Zhang Jian-hong, Xu Yu-wei, Cui Yuan-bo, Chen Zhi-peng, Efficient short proxy signature scheme based on multi-linear map, Elsevier, Vol. 2 2012, pp. 109 – 113. 3. Kim, S., Park, S., and Won, D.: Proxy Signatures, Revisited, in Proc. of ICICS 1997, LNCS 1334, pp.223-232. 4. Zhang, K.: Threshold Proxy Signature Schemes, in Proc. of ISW’97, Information Security Workshop, pp.191-197, 1997. 5. B. Lee, Heesun Kim, Kwangjo Kim” Secure Mobile Agent Using Strong Non-designated Proxy Signature”, Information Security and Privacy Volume 2119 of the series Lecture Notes in Computer Science pp 474- 486, July 2001. 19-Mar-16CDAN' 1611
  • 14. 6. L. H. Li, S. F. Tzeng and M. S. Hwang, Generalization of proxy signature-based on discrete logarithms, Computers and Security, vol.22, 2003, pp.245-255. 7. Javier Herranz and Germ´an S´aez ” Revisiting Fully Distributed Proxy Signature Schemes” INDOCRYPT 2004, LNCS 3348,2004, pp. 356–370. 8. A. Boldyreva, A. Palacio and B. Warinschi. “Secure proxy signature schemes for delegation of signing rights” Manuscript available at http://eprint.iacr.org/2003/096. 9. T. Malkin, S. Obana and M. Yung. The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Proceedings of Eurocrypt’04, LNCS 3027, SpringerVerlag, 2004, pp. 306–322. 10. Z. Shao. Proxy signature schemes based on factoring. Information Processing Letters, Vol. 85,2003, pp. 137–143. 19-Mar-16CDAN' 1612