2,869 research outputs found
Identity Based Self Delegated Signature - Self Proxy Signatures
A proxy signature scheme is a variant of digital signature scheme in which a signer delegates his signing rights to another person called proxy signer, so that the proxy signer can generate the signature of the actual signer in his absence. Self Proxy Signature (SPS) is a type of proxy signature wherein, the original signer delegates the signing rights to himself (Self Delegation), there by generating temporary public and private key pairs for himself. Thus, in SPS the user can prevent the exposure of his private key from repeated use. In this paper, we propose the first identity based self proxy signature scheme. We give a generic scheme and a concrete instantiation in the identity based setting. We have defined the appropriate security model for the same and proved both the generic and identity based schemes in the defined security model
Solving identity delegation problem in the e-government environment
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two generic entities that can solve the problem of delegated access to the telematic services provided by public authorities. The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation. Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token has been revoked. Implications for theory and practice and suggestions for future research are discussed
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
The ability to quickly revoke a compromised key is critical to the security
of any public-key infrastructure. Regrettably, most traditional certificate
revocation schemes suffer from latency, availability, or privacy problems.
These problems are exacerbated by the lack of a native delegation mechanism in
TLS, which increasingly leads domain owners to engage in dangerous practices
such as sharing their private keys with third parties.
We analyze solutions that address the long-standing delegation and revocation
shortcomings of the web PKI, with a focus on approaches that directly affect
the chain of trust (i.e., the X.509 certification path). For this purpose, we
propose a 19-criteria framework for characterizing revocation and delegation
schemes. We also show that combining short-lived delegated credentials or proxy
certificates with an appropriate revocation system would solve several pressing
problems.Comment: IEEE European Symposium on Security and Privacy (EuroS&P) 202
- …