RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2010 Number 4(10), Pages 18–22 (Mi pdm255)

Mathematical Foundations of Computer Security

Authentication in multi-tier systems using proxy signatures

P. A. Pautov

Tomsk State University, Tomsk, Russia

Abstract: Two authentication protocols for multi-tier system based on proxy signatures are provided. Implementation of these protocols using certificates is considered. In the first protocol, proxy signature is only used for the authentication of a client, but in the second one, it is also used for the authentication of requests inside the system. This makes the second protocol more secure.

Keywords: multi-tier systems, authentication, proxy signature.

UDC: 004.056



© Steklov Math. Inst. of RAS, 2026