An ID-based proxy signature scheme secure against proxy key exposure

被引:0
|
作者
Wen F. [1 ]
Cui S. [1 ]
Cui J. [2 ]
机构
[1] School of mathematics, University of Jinan, Jinan
[2] Shandong Women's University, Jinan
关键词
ID-based proxy signature; Provable security; Proxy key exposure;
D O I
10.4156/ijact.vol3.issue5.12
中图分类号
学科分类号
摘要
Proxy Signature is very important technologies in secure e-commerce. In this paper, we study the security of three ID-based Proxy Signature Scheme Against Proxy Key Exposure. We point out that those schemes are vulnerable to proxy key exposure attack. Then we propose a new scheme to overcome this defect and analyze its security and efficiency. We claim that our new scheme is more efficiency and can be proved secure against proxy key exposure in the random oracle model. In particular, our scheme doesn't need secure information channel.
引用
收藏
页码:108 / 116
页数:8
相关论文
共 50 条
  • [31] A novel ID-based partial delegation with warrant proxy signature scheme
    Qian, HF
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 323 - 331
  • [32] ID-based directed proxy signature scheme from bilinear pairings
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Gowri, T.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 487 - 500
  • [33] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [34] Proxy signatures secure against proxy key exposure
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    Paterson, Kenneth G.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 141 - +
  • [35] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
  • [36] The Design of ID-based Fair Proxy Blind Signature Scheme with Weak Linkability
    Wang, Chih Hung
    Fan, Jia-Yu
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 168 - 173
  • [37] Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
    Wang, Q
    Cao, ZF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 167 - 172
  • [38] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [39] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [40] ID-based proxy signature using bilinear pairings
    Xu, J
    Zhang, ZF
    Feng, DG
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 359 - 367