An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption

被引:0
作者
柴震川
曹珍富
陆荣幸
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
ID-based cryptography; proxy signature; bilinear pairings; provable security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointchval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
引用
收藏
页码:271 / 278
页数:8
相关论文
共 14 条
  • [1] Identity-based encryption from the weil pairing. Boneh D,Franklin M. CRYPTO 2001 on Advances in Cryptology . 2001
  • [2] An Identity-Based signature scheme from the Weil Pairing. Yi X. IEEE Communications Letters . 2003
  • [3] Identity-based cryptosystems and signa-ture schemes. Shamir A. CRYP-TO’84 . 1984
  • [4] Threshold proxy signature schemes. Zhang K. Proc. of ISW97’’ . 1997
  • [5] Efficient ID-based blind signature and proxy signature from bilinear pairings. Zhang F G,Kwangjo K. ACISP 2003 . 2003
  • [6] Security arguments for digital signatures and blind signatures
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (03) : 361 - 396
  • [7] Proxy signatures for delegating signing operation. Mambo M,Usuda K,Okamoto E. Proc 3rd ACM Conference on Computer and Communications Securi- ty . 1996
  • [8] Proxy signature schemes based on factoring. Zuhua S. Information Processing Letters . 2003
  • [9] Security Proofs for Signature Scheme. Point D,Stern J. Advance in Cryptology-Proceedings of EUROCRYPT‘96 . 1996
  • [10] Secure Proxy Signature Schemes for Delegation of signing Rights. A.boldyreva,A.Palacio,B.Warinschi. Cryptology ePrint Archive:Report 2003/096 .