An Anonymity-Revoking Proxy Signature Scheme

2012 ◽  
Vol 263-266 ◽  
pp. 2906-2910
Author(s):  
De Dong Zhang ◽  
Zhao Feng Ma ◽  
Yi Xian Yang

The revocation of delegated rights and anonymity of proxy signer are essential issues of the proxy signature schemes. Based on the bilinear pairings, an anonymity-revoking proxy signature scheme was proposed. In this scheme, when an original signer found that a proxy signer was malicious or the delegation period was expired, he/she could revoke the malicious proxy signer’s signing capability efficiently through a trusted authority. On the other hand, only the signature from delegation of the original signer could be confirmed by the verifier and the identity of the proxy signer could not be known to the verifier. In appearing of disputation, the verifier could reveal the real identity of the proxy signer with the help of the original signer. This scheme can protect not only the original signer’s benefit but also the proxy signer s privacy.

2020 ◽  
Vol 35 (24) ◽  
pp. 2050197
Author(s):  
Xiangjun Xin ◽  
Qinglan Yang ◽  
Fagen Li

A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation, a new quantum proxy signature scheme is proposed. The security of our quantum proxy signature scheme can be formally proved under security model. The security model of the quantum proxy signatures is helpful for analyzing and improving the security of the quantum proxy signature schemes. On the other hand, compared with the other quantum proxy signatures, the new one proposed in this paper is the first that can be formally proved to be secure under security model.


2011 ◽  
Vol 255-260 ◽  
pp. 2192-2196
Author(s):  
Cheng Yu Hu ◽  
Peng Tao Liu

The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring signature depends linearly on the ring size, and the other is that the signer can shift the blame to victims because of the anonymity. Some authors have studied the constant-size ring signature and deniable ring signature to solve these two problems. This paper shows that an identity-based ring signature scheme with constant size has some security problems by using an insecure accumulator and its verification process does not include the message m. Then we combine the concepts of “constant-size” and “deniable” to form an id-based deniable ring signature with constant-size signature. The new scheme with constant-size signature length is proposed based on an improved accumulator from bilinear pairings and it solves the problem of anonymity abuse.


2012 ◽  
Vol 2012 ◽  
pp. 1-10
Author(s):  
Jue-Sam Chou

Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders. They claimed that their scheme can make the proxy signer anonymous. However, based on our research, we determined that this was not the case and the proxy signer's privacy was not anonymous. Hence, in this paper, we propose a new anonymous proxy signature scheme that truly makes the proxy signer anonymous while making it more secure and efficient when compared with Yu et al.'s scheme. Our proxy signature scheme consists of two contributions. First, we mainly use random numbers and bilinear pairings to attain the anonymous property. Secondly, we increase the security and efficiency of our proxy in the design.


1973 ◽  
Vol 15 (2) ◽  
pp. 243-256 ◽  
Author(s):  
T. K. Sheng

It is well known that no rational number is approximable to order higher than 1. Roth [3] showed that an algebraic number is not approximable to order greater than 2. On the other hand it is easy to construct numbers, the Liouville numbers, which are approximable to any order (see [2], p. 162). We are led to the question, “Let Nn(α, β) denote the number of distinct rational points with denominators ≦ n contained in an interval (α, β). What is the behaviour of Nn(α, + 1/n) as α varies on the real line?” We shall prove that and that there are “compressions” and “rarefactions” of rational points on the real line.


1998 ◽  
Vol 32 (3) ◽  
Author(s):  
J. L. Helberg

The book of Amos contains many undertones of threat, except in the epilogue which, according to many scholars, is redactional The question thus comes to the fore whether this characteristic implies that God is seen by Amos as a God of threat for whom one can only have fear. This article, however, points out Amos’ moral justification of God's deeds. Israel's actions, on the other hand, display a self-centredness and a lack of theocentric and personal approach. Within this framework the history of salvation, especially the exodus and the conquest of the land, as well as the election, covenant and the idea of the remnant, is fossilised and God is made a captive of space, time and relations. However, Amos' proclamation implies that in reality God cannot be made captive - neither of such a religion nor of a theology of threat. Amos envisions a situation in which everything will comply with the real aim set for it/him.


2017 ◽  
Vol 1 (13) ◽  
pp. 33-48
Author(s):  
Myroslava Khutorna

This paper is devoted to the consideration of the preconditions and results of the banking sector of Ukraine transforming, its influence on the sector’s productivity, stability and significance for the real economy. It’s grounded that banking sector of Ukraine has seriously weakened its potential for the economic development stimulation. On the one hand, due to the banking sector clearance from the bad and unscrupulous banks the system has become much more sensitive to the monetary instruments and its state is going to be more predictable and better controlled. But on the other hand, massive banks’ liquidations have caused the worsening of the confidence in financial system and radical increasing of the market concentration the highest degree of which is observed in the householders’ deposit market.


2013 ◽  
Vol 380-384 ◽  
pp. 2435-2438 ◽  
Author(s):  
Shu Rong Feng ◽  
Jiao Mo ◽  
Hua Zhang ◽  
Zheng Ping Jin

Certificateless short signature schemes can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However, all existing certificateless short signature schemes only proven secure against a normal adversary which can only obtain the valid signature for the original public key rather than a super adversary which can obtain the valid signature for the replaced public key. Recently, Fan et al. proposed a certificateless short signature scheme which is very efficient, but we found it is still cannot against super adversary. In this paper, we first analysis their scheme, and then present an improved scheme which can against super adversaries. Furthermore, our scheme can provide both the strongest security level and the shortest signature size compared the existed provably secure certificateless short signature scheme.


2021 ◽  
Vol 39 (9) ◽  
Author(s):  
Maryna O. Dei ◽  
Iryna S. Skliar ◽  
Armen O. Atynian

The purpose of the article is to conceptualize the philosophy of postmodernism that evolves, on one hand, as a search for new forms of creative self-expression, and, on the other hand, is presented as a crisis of philosophical cognition. The leading method for the study of postmodernism concepts is the systemic method allowing to determine their integrity and to explicate associative connections between them as interactions and interconnections brought into the system of the concept. Summarizing the discourse, we note that the main goal of postmodernism is to eliminate rational discourse and proclaim the end of the general metadiscourse of rationalism. Postmodernity should be seen as the transplantation of aesthetic matrices into surrogate, illusory, eclectic ones, which veiled the real essence of phenomena and processes.


2020 ◽  
Vol 28 (2) ◽  
pp. 192
Author(s):  
Qurrata A'yun ◽  
Yor Hananta

So far, in social media, the hadith "ballighū 'annī walau āyah" has been widely misunderstood as a proposition for preaching even if it is only one verse. On the other hand, this hadith is also used as a suggestion for preaching without understanding the full meaning of a verse. This understanding is different from the real understanding, so a comprehensive discussion is needed to describe it. This article aims to identify misconceptions in understanding the hadith "ballighū 'annī walau āyah" on social media twitter and meet them with the correct meanings of the hadith. This study is a qualitative study which classify and analyze data by descriptive analysis. The discussion of this article explains how the hadith ballighū 'annī walau āyah is understood by Twitter netizens. The understanding of netizens is grouped into two categories, namely those that are appropriate and not in accordance with their real understanding. The factors that lead to misunderstanding of the hadith ballighū 'annī walau āyah are the insights of the hadith that are conveyed only a piece (not intact) and the dissemination of understanding through social media twitter with a short number of characters. This phenomenon causes a transformation of the hadith understanding in the form of degradation and distortion


Sign in / Sign up

Export Citation Format

Share Document