ارسل ملاحظاتك

ارسل ملاحظاتك لنا







A Novel Proxy Signature Scheme Based On User Hierarchical Access Control Policy

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Das, Ashok Kumar (Author)
مؤلفين آخرين: Massand, Ashish (Co-Author) , Patil, Sagar (Co-Author)
المجلد/العدد: مج25, ع2
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2013
الصفحات: 219 - 228
DOI: 10.33948/0584-025-002-010
ISSN: 1319-1578
رقم MD: 972973
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Proxy Signature | Hierarchical Access Control | Polynomial Interpolation | Security | Discrete Logarithm | Hash Function
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02578nam a22002537a 4500
001 1715880
024 |3 10.33948/0584-025-002-010 
041 |a eng 
044 |b السعودية 
100 |9 524544  |a Das, Ashok Kumar  |e Author 
245 |a A Novel Proxy Signature Scheme Based On User Hierarchical Access Control Policy 
260 |b جامعة الملك سعود  |c 2013 
300 |a 219 - 228 
336 |a بحوث ومقالات  |b Article 
520 |b In this paper, we propose a new security protocol for proxy signature by a hierarchy of proxy signers. In this protocol, the original signer delegates his/her signing capability to a predefined hierarchy of proxy signers. Given the documents of a security class to be signed by the original signer, our scheme suggests a protocol for the hierarchy of proxy signers to sign the document on behalf of the original signer. The concept of hierarchical access control limits the number of people who could sign the document to the people who have the required security clearances. User in a security class requires two secret keys: one which identifies his/her security clearance, and that can also be derived by a user of upper level security clearance and second is his/her private key which identifies him/her as a proxy signer for the signature generation. We show that our scheme is efficient in terms of computational complexity as compared to the existing related proxy signature schemes based on the hierarchical access control. Our scheme also supports addition and deletion of security classes in the hierarchy. We show through security analysis that our scheme is secure against possible attacks. Furthermore, through the formal security analysis using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool we show that our scheme is also secure against passive and active attacks. 
653 |a علوم الحاسوب  |a أمن المعلومات  |a التسلسل الهرمي 
692 |b Proxy Signature  |b Hierarchical Access Control  |b Polynomial Interpolation  |b Security  |b Discrete Logarithm  |b Hash Function 
700 |9 524546  |a Massand, Ashish  |e Co-Author 
700 |9 524548  |a Patil, Sagar  |e Co-Author 
773 |c 010  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 002  |m مج25, ع2  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 025  |x 1319-1578 
856 |u 0584-025-002-010.pdf 
930 |d y  |p y 
995 |a science 
999 |c 972973  |d 972973 

عناصر مشابهة