A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME

被引:0
|
作者
Chen, Yu-Chi [1 ]
Liu, Chao-Liang [2 ]
Horng, Gwoboa [1 ]
Chen, Kuo-Chang [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
[2] Asia Univ, Dept Informat Sci & Applicat, Taichung 41354, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2011年 / 7卷 / 09期
关键词
Proxy signature; Certificateless cryptography; Certificate signature; Pairing; EFFICIENT; ENCRYPTION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have been proposed in many studies, certificateless public key cryptography (CL-PKC), first proposed by Al-Riyami and Paterson, has been widely used to avoid the key escrow problem in identity-based public key cryptography. In this paper, we combine the concepts of certificateless cryptography and proxy signature to propose a certificateless proxy signature scheme from bilinear pairings, and we also present its security model. This scheme is provably secure and existentially unforgeable under the chosen message attack in the random oracle model.
引用
收藏
页码:5557 / 5569
页数:13
相关论文
共 50 条
  • [1] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [2] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    INFORMATICA, 2010, 21 (02) : 277 - 294
  • [3] Provably secure certificateless proxy signature scheme in the standard model
    Lu, Yang
    Li, Jiguo
    THEORETICAL COMPUTER SCIENCE, 2016, 639 : 42 - 59
  • [4] Provably Secure Certificateless Proxy Signature Scheme in the Standard Model
    Deng, Lunzhi
    Hu, Zhenyu
    Ruan, Yu
    Wang, Tao
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (02): : 279 - 288
  • [5] Provably secure certificateless digital signature scheme
    Wang, Hua-Qun
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 76 - 78
  • [6] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689
  • [7] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [8] Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
    Chen, Y.-C. (s9756034@cs.nchu.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21):
  • [9] A new provably secure certificateless short signature scheme
    Choi, Kyu Young
    Park, Jong Hwan
    Lee, Dong Hoon
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1760 - 1768
  • [10] Study on a Provably Secure Certificateless Aggregate Signature Scheme
    Liu, Yan
    Hu, Xiaoming
    Tan, Wenan
    2016 IEEE 13TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL (ICNSC), 2016,