Directed Proxy Signature in the Standard Model

被引:0
作者
明洋 [1 ,2 ]
王育民 [3 ]
机构
[1] School of Information Engineering,Chang'an University
[2] State Key Laboratory of Integrated Service Network,Xidian University
[3] Shaanxi Road Traffic Detection and Equipment Engineering Research Center,Chang'an University
基金
中国博士后科学基金;
关键词
directed signature; proxy signature; bilinear pairings; standard model;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
A directed signature is a type of signature with restricted verification ability.Directed signatures allow only a designated verifier to check the validity of the signature issued to him,and at the time of trouble or if necessary,any third party can verify the signature with the help of the signer or the designated verifier.Directed signature schemes are widely used in situations where the receiver’s privacy should be protected.Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available.Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications.In this paper,we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature.Then,we formalize its security model and present a concrete scheme in the standard model.Finally,we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption,and invisible under the decisional Diffie-Hellman assumption.
引用
收藏
页码:663 / 671
页数:9
相关论文
共 11 条
  • [1] Modified Maurer-Yacobi’’s scheme and its applications. Lim C H,Lee P J. Proceedings of the Australasian Conference on Information Security and Privacy . 1992
  • [2] Limited verifier signature from bilinear pairings. Chen X,Zhang F,Kim K. Proceedings of the International Conference on Applied Cryptography and Network Security . 2004
  • [3] A directed thresholdsignature scheme. Sunder L,Manoj K. http://arxiv.org/ftp/cs/papers/0411/0411005.pdf . 2004
  • [4] A directed signature scheme and its applications. Lal S,Kumar M. http://arxiv.org/ftp/cs/papers/0409/0409036.pdf . 2004
  • [5] New (t,n) threshold directed signature scheme with provable security. Lu R,Lin X,Cao Z,et al. Journal of Information Science . 2008
  • [6] A secure identity-based multi-proxy signature scheme. Cao F,,Cao Z. Computers & Electrical Engineering . 2009
  • [7] Security analysis of some proxy signatures. Wang Gui-lin,Bao Feng,Zhou Jian-yin,et al. Proceedings of the International Conference on Information and Communications Security . 2003
  • [8] A directed signature scheme based on RSA assumption. Lu R,Cao Z. International Journal of Network Security . 2006
  • [9] ID-based directed threshold multisignature scheme from bilinear pairings. Reddy P V,Rao B U,Gowri T. International Journal on Computer Science and Engineering . 2009
  • [10] A directed signature scheme and its application to group key initial distribution. Wei Q,He J,Shao H. Proceedings of the International Conference on Interaction Sciences: Information Technology,Culture and Human . 2009