期刊文献+

Another ID-Based Proxy Signature Scheme and Its Extension 被引量:3

Another ID-Based Proxy Signature Scheme and Its Extension
下载PDF
导出
摘要 So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring. So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期33-36,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the Scientific Research Common Program of Beijing Municipal Commission of Education (KM200610009011) and the Open Foundation of State Key Laboratory of Information Security (04002)
关键词 proxy signature MULTISIGNATURE security proof proxy signature multisignature security proof
  • 相关文献

参考文献6

  • 1Mambo M,Usuda K,Okmamoto E.Proxy Signatures: Delegation of the Power to Sign Message[].IEICE Transaction Functional.1996
  • 2Gamage C,Leiwo J,Zheng Y.An Efficient Scheme for Secure Message Transmission Using Proxy-Signcryption[].Proceeding of the th Australasian Computer Science.1999
  • 3Hess F.Efficient Identity Based Signature Scheme Based on Paring[].SAC LNCS.2002
  • 4Mambo M,Usuda K,Kim K.Secret Computation with Secret for Mobile agent Using One-Time Proxy Signatures[].ISC.2001
  • 5Boldyreva A,Palacio A,Warinschi B.Secure Proxy Signatures for Delegation of Signing Right. http://eprint.iacr.org/2003/096.pdf . 2003
  • 6Goldwasser S,Micali S,Rivest R.A Digital Signature Scheme Secure against Adaptive Choen-Message Attacks[].SIAM Journal on Computing.1988

同被引文献2

引证文献3

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部