Secure and Efficient Proxy Signature Scheme in the Standard Model

被引:0
作者
Gu Ke [1 ]
Jia Weijia [2 ]
Chen Rongyuan [3 ]
Liu Xingbao [1 ,3 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[3] Hunan Univ Commerce, Modern Educ Ctr, Changsha 410205, Hunan, Peoples R China
来源
CHINESE JOURNAL OF ELECTRONICS | 2013年 / 22卷 / 04期
关键词
Proxy signature; Security model; Provable security; Efficiency; Computational Diffie-Hellman (CDH) assumption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing proxy signature schemes are not proved to have complete security in the provable security model for proxy signature, whether the schemes are secure needs to be further studied. We show a generalized provable security model for proxy signature. Comparing with Boldyreva's security model, we introduce Schuldt's work to our security model. We propose a secure proxy signature scheme, which is based on Waters' signature scheme in the standard model. Comparing with other proxy signature schemes having a reduction to CDH assumption in the standard model, our scheme is more secure and efficient.
引用
收藏
页码:666 / 670
页数:5
相关论文
共 23 条
  • [1] [Anonymous], SECURE PROXY SIGNATU
  • [2] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [3] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [4] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [5] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
  • [6] Fuchsbauer G, 2009, LECT NOTES COMPUT SC, V5458, P95
  • [7] Goh EJ, 2003, LECT NOTES COMPUT SC, V2656, P401
  • [8] Herranz J., 2003, REVISITING FULLY DIS
  • [9] Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
    Hsu, CL
    Wu, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 305 - 319
  • [10] Cryptanalysis and improvement of a threshold proxy signature scheme
    Hu, Jianghong
    Zhang, Jianzhong
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 169 - 173