Title :
Efficient Proxy Signatures For Ubiquitous Computing
Author :
Chandrasekhar, Santosh ; Chakrabarti, Saikat ; Singhal, Mukesh
Author_Institution :
Dept. of Comput. Sci., Kentucky Univ., Lexington, KY
Abstract :
Proxy signatures have been extensively used to solve authentication issues in mobile agent applications and authorization problems in distributed systems. However, conventional proxy signatures use traditional public key cryptosystems and are quite heavyweight. Thus, a direct application of these traditional signatures face significant performance challenges when applied to resource constrained ubiquitous computing environments. In this paper, we introduce the use of an efficient cryptographic primitive from linear feedback shift register (LFSR) sequences to build lightweight proxy signatures, suitable for resource constrained devices. We present a novel third-order LFSR sequence- based, 2-party signature scheme, SCLFSR, following a well- known Schnorr signature scheme. Using SCLFSR, we construct an efficient proxy signature, PC LFSR, which can serve as a protocol building block for performance sensitive ubiquitous computing applications. The scheme, PCLFSR, is also the first construction of a proxy signature using primitives from LFSR sequences. We perform extensive theoretical analysis including correctness and security of PCLFSR and also present a performance (computation and communication costs, storage overhead) comparison of the proposed scheme with well-known traditional constructions.
Keywords :
authorisation; binary sequences; mobile agents; public key cryptography; ubiquitous computing; LFSR; SCLFSR; Schnorr signature scheme; linear feedback shift register sequences; mobile agent applications; proxy signatures; public key cryptosystems; ubiquitous computing; Authentication; Authorization; Linear feedback shift registers; Mobile agents; Performance analysis; Pervasive computing; Protocols; Public key cryptography; Security; Ubiquitous computing; LFSR sequence; Proxy signature; Schnorr signature; cubic LFSR-based cryptosystems; mobile agents; provable security; ubiquitous systems;
Conference_Titel :
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on
Conference_Location :
Taichung
Print_ISBN :
978-0-7695-3158-8
Electronic_ISBN :
978-0-7695-3158-8
DOI :
10.1109/SUTC.2008.64