Certificateless proxy signature scheme based on discrete logarithm problem

被引:0
|
作者
Xu, Chun-Gen [1 ]
Zhang, Ao-Hong [1 ]
Han, Mu [2 ]
Dou, Ben-Nian [1 ]
机构
[1] School of Sciences, NUST, Nanjing 210094, China
[2] School of Computer Science and Technology, NUST, Nanjing 210094, China
关键词
Electronic document identification systems - Problem solving - Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
To solve the problems of certificate management or key escrow in proxy signature schemes, a new certificateless proxy signature scheme(CLPS) is presented. This scheme solves the key escrow problem by binding two partially private keys with a same identity and also satisfies all the required characteristics of the proxy signature. Its security is based on the discrete logarithm problem(DLP). It has existential unforgeability, effectively resisting the attack of Type-I adversary and Type-II adversary. Compared with the existed CLPS, the CLPS presented here doesn't use the bilinear pairing and its proxy keys use the Schnorr short signature, and its efficiency and security is improved.
引用
收藏
页码:733 / 737
相关论文
共 50 条
  • [31] On the Security of a Certificateless Proxy Signature Scheme with Message Recovery
    Shi, Wenbo
    He, Debiao
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [32] A certificateless proxy ring signature scheme with provable security
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    International Journal of Network Security, 2011, 12 (02) : 92 - 106
  • [33] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    INFORMATICA, 2010, 21 (02) : 277 - 294
  • [34] Cryptanalysis and improvement of a certificateless strong proxy signature scheme
    Hu, Guo-Zheng
    Han, Lan-Sheng
    Wang, Zhan-Qing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (05): : 115 - 118
  • [35] On the security of a certificateless proxy signature scheme in the standard model
    Zhou, Caixue
    Dong, Xiwei
    Wang, Lihua
    Li, Tao
    International Journal of Network Security, 2019, 21 (04) : 576 - 581
  • [36] Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme
    Zhang, Jianhong
    Chen, Hua
    Geng, Qin
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 1491 - 1495
  • [37] Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
    FEI Ru-chun 1
    2.Department of Information Engineering
    Wuhan University Journal of Natural Sciences, 2004, (05) : 770 - 774
  • [38] NEW DIGITAL SIGNATURE SCHEME BASED ON DISCRETE LOGARITHM - COMMENT
    NYBERG, K
    ELECTRONICS LETTERS, 1994, 30 (06) : 481 - 481
  • [39] A Disordered Multiple Group Signature Scheme Based on Discrete Logarithm
    Huang, Hua
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 323 - 325
  • [40] On constructing certificateless proxy signature from certificateless signature
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Hong X.
    Long Y.
    Jia W.-W.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 692 - 694