Identifiability is one of several security requirements of general proxy signature schemes, i.e. a verifier can determine the identity of the corresponding proxy signer from a proxy signature. In special application, the original signer wants to conceal the identity of the corresponding proxy signer in the proxy signature. The verifier can not recognize the identity of the proxy signer from the proxy signature. In the case of a later dispute, the verifier can reveal the real identity of the proxy signer with the help of the original signer from the proxy signature. In the paper, a new proxy signature scheme should satisfy this requirement.
Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996,E79-A:9: 1338- 1353.[2]Lee B, Kim H, Kim K. Strong proxy signature and its applications. International Conference on Information and Communication Security, Proc. of SCIS, Japan, 2001:603 - 608.[3]Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature Proc. ACISP, Spring-Verlag,2001, LNCS 1334:474 - 486.[4]Shum K, Wei Victor K. A strong proxy signature scheme with proxy signer privacy protection. http:∥www. computer. org/proceedings/wetice/1748/17480055.pdf, 2002.[5]Kim S.[J].Park S, Won D. Proxy signature, revisited, International Conference on Information and Communication Security, Proc of ICICS 97, Berlin, Springer.1997,:-