Publication Type

Journal Article

Version

publishedVersion

Publication Date

4-2016

Abstract

Anonymous proxy signatures are very useful in the construction of anonymous credential systems such as anonymous voting and anonymous authentication protocols. As a basic requirement, we should ensure an honest proxy signer is anonymous. However, in order to prevent the proxy signer from abusing the signing right, we should also allow dishonest signers to be traced. In this paper, we present three novel anonymous proxy signature schemes with different levels of (namely, public, internal and original signer) traceability. We define the formal definitions and security models for these three different settings, and prove the security of our proposed schemes under some standard assumptions.

Keywords

Anonymity, Privacy, Proxy signature, Ring signature, Traceability

Discipline

Information Security

Research Areas

Information Systems and Management

Publication

Computer Journal

Volume

59

Issue

4

First Page

559

Last Page

569

ISSN

0010-4620

Identifier

10.1093/comjnl/bxv080

Publisher

Oxford University Press (OUP): Policy B - Oxford Open Option B

Additional URL

http://doi.org/10.1093/comjnl/bxv080

Share

COinS