UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS
First Claim
1. A method for using a proxy to transform a signature of a delegatee to a signature of a delegator on a message, comprising steps for:
- generating a public and private key pair for the delegatee;
signing a message with the delegates'"'"'s signature, and verifying authenticity of the signed message using the key pair;
generating a re-signature key for the delegator;
delegating the re-signature key to a proxy; and
causing the proxy to transform a signature of the delegatee on the message to the signature of the delegator on the message by processing the signature of the delegatee using the re-signature key.
2 Assignments
0 Petitions
Accused Products
Abstract
A “proxy re-signature system” provides various techniques for transforming a delegatee'"'"'s signature on a message m into a delegator'"'"'s on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described. Various combinations of the proxy re-signature process and the re-signature conversion process result in an overall process that is unidirectional, multi-use, private, and non-interactive. As such, the proxy re-signature system is applicable for use with a wide range of applications.
44 Citations
20 Claims
-
1. A method for using a proxy to transform a signature of a delegatee to a signature of a delegator on a message, comprising steps for:
-
generating a public and private key pair for the delegatee; signing a message with the delegates'"'"'s signature, and verifying authenticity of the signed message using the key pair; generating a re-signature key for the delegator; delegating the re-signature key to a proxy; and causing the proxy to transform a signature of the delegatee on the message to the signature of the delegator on the message by processing the signature of the delegatee using the re-signature key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for transforming a signature of a delegatee to a signature of a delegator on a message, comprising:
-
a device for generating a public and private key pair for the delegatee; a device for allowing a delegatee to sign a message; a device for verifying authenticity of a signature of the delegatee on the signed message using the key pair; a device for generating a re-signature key for the delegator using a combination of a private key of the delegator and the public key of the delegatee; a device for delegating the re-signature key to a proxy; and a device for transforming the signature of the delegatee on the message to the signature of the delegator on the message by using a proxy to process the signature of the delegatee using the re-signature key. - View Dependent Claims (14, 15, 16)
-
-
17. A computer-readable medium having computer executable instructions stored therein for using a proxy to transform a signature of a delegatee to a signature of a delegator on a message, said instructions comprising:
-
using a signer module for generating a public and private key pair for the delegatee; providing a message with the delegates'"'"'s signature; using a proxy for generating a re-signature key for the delegator from a combination of a private key of the delegator and the public key of the delegatee; delegating the re-signature key to a proxy; and causing the proxy to transform a signature of the delegatee on the message to the signature of the delegator on the message by processing the signature of the delegatee using the re-signature key. - View Dependent Claims (18, 19, 20)
-
Specification