期刊文献+

On Constructing Certificateless Proxy Signature from Certificateless Signature

On Constructing Certificateless Proxy Signature from Certificateless Signature
原文传递
导出
摘要 In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B. Recently many identity-based (ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting. Certificateless cryptography can overcome the key escrow problem. In this paper, we present a general security model for certificateless proxy signature scheme. Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期692-694,共3页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
关键词 certificateless signature proxy signature certificateless proxy signature 认证信号 代理信号 密码 构建方式
  • 相关文献

参考文献8

  • 1Mambo,M.,Usuda,K.,Okamoto,E.Proxy signatures: Delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.1996
  • 2Shamir A.Identity Based Cryptosystems and Signature Schemes[].Advances in Cryptology CRYPT’:LNCS.1985
  • 3Al-Riyami,S,Paterson,K.Certificateless Public Key Cryptography[].Advances in Cryptology-ASIACRYPT’ LNCS.2003
  • 4HU B,WONG D,ZHANG Z,et al.Key replacement attack against a generic construction of certificateless signature*[].th Australasian Conference on Information Security and PrivacyACISP.2006
  • 5HUANG X,SUSILO W,MU Y,et al.On the security of certificateless signature schemes from Asiacrypt2003[].th International Conference on Cryptology and Network SecurityCANS.2005
  • 6Yap Wun-She,Heng Swee-Huay,Goi Bok-Min.An Efficient Certificateless Signature Scheme[].Proceedings ofEmerging Directions in Embedded and Ubiquitous Computing(EUC ).2006
  • 7Yum D H,Lee P J.Generic construction of certificateless signature[].ACISP’.2004
  • 8Zhang Z,Wong D S,Xu J, et al.Certificateless Public-Key Signature: Security Model and Efficient Construction[].ACNS.2006

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部