Provable security of ID-based proxy signature schemes

被引:0
|
作者
Gu, CX [1 ]
Zhu, YF [1 ]
机构
[1] Informat Engn Univ, Network Engn Dept, Zhengzhou 450002, Peoples R China
来源
NETWORKING AND MOBILE COMPUTING, PROCEEDINGS | 2005年 / 3619卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last couple of years, identity based cryptography has got fruitful achievements [1,2,3,4]. This paper provides theoretical discussions for the provable-security of ID-based proxy signature primitive. First, we present a general security model for such schemes. Then we describe how to construct an ID-based proxy signature scheme with a secure ID-based signature scheme, and prove the construction's security in the standard model. At last, we analyze the ID-based proxy signature scheme proposed by Zhang et.al.[4], and show that this scheme can be proven to be secure in the random oracle model.
引用
收藏
页码:1277 / 1286
页数:10
相关论文
共 50 条
  • [1] Provable Security of ID-Based Proxy Multi-Signature Schemes
    GU Chunxiang
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 87 - 90
  • [2] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [3] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [4] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [5] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    JournalofShanghaiJiaotongUniversity(Science), 2006, (03) : 271 - 278
  • [6] Efficient ID-based Proxy Blind Signature Schemes from Pairings
    Pan, Heng
    Ke, Ke
    Gu, Chunxiang
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 390 - 393
  • [7] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [8] ID-based ring signature and proxy ring signature schemes from bilinear pairings
    Department of Mathematics, Pranveer Singh Institute of Technology, Kalpi Road, Bhauti, Kanpur, India
    不详
    Int. J. Netw. Secur., 2007, 2 (187-192):
  • [9] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [10] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):