期刊文献+

Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer

Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
原文传递
导出
摘要 Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme. Proxy signature has drawn great concerns.However, there still remains a challenge to construct a provably secure and effcient proxy signature scheme.In this paper, we propose an effcient proxy signature scheme based on factoring, and prove that it is secure in the random oracle.Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期675-678,共4页 上海交通大学学报(英文版)
基金 the National Basic Research Program(973) of China (No. 2007CB31074) the National Natural Science Foundation of China (No. 90718001)
关键词 proxy signature FACTORING untrustworthy proxy signer 代理信号 因式分解 不信任代理签名 计算机技术
  • 相关文献

参考文献1

二级参考文献10

  • 1Mambo M,,Usuda K,Okamoto E.proxy signatures:delegation of the power to sign message[].IEICE Trans Funct.1996
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegation signing operation[].ProcThird ACM Conference on Computer and Communication Security.1996
  • 3Sun H M,Lee N Y,Hwang T.Threshold proxy signatures[].IEE Proc Compu Dig Tech.1999
  • 4Yi L,Bai G,Xiao G.Proxy multi-signature scheme:A new type of proxy signature scheme[].Electronics Letters.2000
  • 5Hwang S J,Chen C C.A new proxy multi-signature scheme[].International Workshop on Cryptology and Network Security.2000
  • 6Shao Z.Proxy signature schemes based on factoring[].Information Processing Letters.2003
  • 7Lu R,Cao Z,Zhou Y.Proxy blind multi-signature scheme without a secure channel[].Applied Mathematics and Computation.2005
  • 8Lu R,Cao Z,Zhu H.A robust(k,n)+1 threshold proxy signature scheme based on factoring[].Applied Mathematics and Computation.2005
  • 9Zhang F,Safavi-Naini R,Susilo W.An efficient signature scheme from bilinear pairings and its applications[].Lecture Notes in Computer Science.2004
  • 10Boneh D,Lynn B,Shacham H.Short signature from the Weft pairing[].Lecture Notes in Computer Science.2001

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部