<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf15402</article-id><article-id pub-id-type="doi">10.15388/Informatica.2004.072</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>An Efficient Proxy Signature Scheme with Revocation</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Das</surname><given-names>Manik Lal</given-names></name><email xlink:href="mailto:mldas@idrbt.ac.in">mldas@idrbt.ac.in</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Saxena</surname><given-names>Ashutosh</given-names></name><email xlink:href="mailto:asaxena@idrbt.ac.in">asaxena@idrbt.ac.in</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Gulati</surname><given-names>Ved P.</given-names></name><email xlink:href="mailto:vpgulati@idrbt.ac.in">vpgulati@idrbt.ac.in</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Institute for Development and Research in Banking Technology, Castle Hills, Road No. 1, Masab Tank, Hyderabad, India</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2004</year></pub-date><volume>15</volume><issue>4</issue><fpage>455</fpage><lpage>464</lpage><history><date date-type="received"><day>01</day><month>10</month><year>2004</year></date></history><abstract><p>A proxy signature allows a designated person, called a proxy signer, to sign the message on behalf of the original signer. Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. A number of proxy signature schemes have been proposed and succeeded for proxy delegations, but the schemes are in defective in proxy revocations. In this paper, we propose two proxy signature schemes based on RSA cryptosystems. The proposed first scheme does not consider proxy revocation mechanism; however, it will help us to compare our protocol with the existing RSA‐based schemes. The proposed second scheme provides an effective proxy revocation mechanism. The proposed schemes do not require any secure channel to proxy key delivery and support the necessary security requirements of proxy signature.</p></abstract><kwd-group><label>Keywords</label><kwd>proxy signature</kwd><kwd>proxy key</kwd><kwd>partial delegation</kwd><kwd>warrant</kwd><kwd>timestamp</kwd><kwd>revocation</kwd></kwd-group></article-meta></front></article>