Abstract | ||
---|---|---|
Proxy signatures have been extensively used to solve authentication issues in mobile agent applications and authorization problems in distributed systems. However, conventional proxy signatures use traditional public key cryptosystems and are quite heavyweight. Thus, a direct application of these traditional signatures face significant performance challenges when applied to resource constrained ubiquitous computing environments. In this paper, we introduce the use of an efficient cryptographic primitive from linear feedback shift register (LFSR) sequences to build lightweight proxy signatures, suitable for resource constrained devices. We present a novel third-order LFSR sequence- based, 2-party signature scheme, SCLFSR, following a well- known Schnorr signature scheme. Using SCLFSR, we construct an efficient proxy signature, PC LFSR, which can serve as a protocol building block for performance sensitive ubiquitous computing applications. The scheme, PCLFSR, is also the first construction of a proxy signature using primitives from LFSR sequences. We perform extensive theoretical analysis including correctness and security of PCLFSR and also present a performance (computation and communication costs, storage overhead) comparison of the proposed scheme with well-known traditional constructions. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/SUTC.2008.64 | Taichung |
Keywords | Field | DocType |
lfsr sequence,novel third-order lfsr sequence-based,efficient proxy signature,traditional signature,proxy signature,efficient proxy signatures,well-known schnorr signature scheme,proposed scheme,2-party signature scheme,lightweight proxy signature,ubiquitous computing,conventional proxy signature,authorisation,security,pervasive computing,mobile agent,schnorr signature,authorization,linear feedback shift register,protocols,lfsr,provable security,distributed system,authentication,public key cryptography | Authentication,Computer science,Mobile agent,Correctness,Cryptographic primitive,Ubiquitous computing,Public-key cryptography,Distributed computing,Schnorr signature,Provable security | Conference |
ISBN | Citations | PageRank |
978-0-7695-3158-8 | 0 | 0.34 |
References | Authors | |
20 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Santosh Chandrasekhar | 1 | 83 | 6.29 |
Saikat Chakrabarti | 2 | 188 | 21.86 |
Mukesh Singhal | 3 | 2602 | 259.07 |