期刊文献+

An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption 被引量:1

An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
下载PDF
导出
摘要 Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointchval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes. Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第3期271-278,共8页 上海交通大学学报(英文版)
基金 National Natural Science Foundation of Chi-na for Distinguished Young Scholars (No.60225007) National Research Fund for theDoctoral Program of Higher Education ofChina (No.20020248024) Grant-in-Aid forScientific Research(C) (No.14540100)
关键词 密码学 代理符号 双线性配对 安全性 ID-based cryptography proxy signature bilinear pairings provable security
  • 相关文献

参考文献11

  • 1David Pointcheval,Jacques Stern.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology.2000(3)
  • 2Shamir A.Identity-based cryptosystems and signa-ture schemes[].CRYP-TO’.1984
  • 3Yi X.An Identity-Based signature scheme from the Weil Pairing[].IEEE Communications Letters.2003
  • 4Boneh D,Franklin M.Identity-based encryption from the weil pairing[].CRYPTO on Advances in Cryptology.2001
  • 5A.boldyreva,A.Palacio,B.Warinschi.Secure Proxy Signature Schemes for Delegation of signing Rights[].Cryptology ePrint Archive:Report /.
  • 6Point D,Stern J.Security Proofs for Signature Scheme[].Advance in Cryptology-Proceedings of EUROCRYPT‘.1996
  • 7Zuhua S.Proxy signature schemes based on factoring[].Information Processing Letters.2003
  • 8Mambo M,Usuda K,Okamoto E.Proxy signatures:Delegation of the power to sign messages[].IEICE Transactions on Fundamental’s of ElectronicsCommunications and Computer Sciences.1996
  • 9Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[].Proc rd ACM Conference on Computer and Communications Securi- ty.1996
  • 10Zhang K.Threshold proxy signature schemes[].Proc of ISW’’.1997

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部