Abstract:
Two authentication protocols for multi-tier system based on proxy signatures are provided. Implementation of these protocols using certificates is considered. In the first protocol, proxy signature is only used for the authentication of a client, but in the second one, it is also used for the authentication of requests inside the system. This makes the second protocol more secure.