An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption

被引:0
|
作者
柴震川
曹珍富
陆荣幸
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
ID-based cryptography; proxy signature; bilinear pairings; provable security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointchval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
引用
收藏
页码:271 / 278
页数:8
相关论文
共 50 条
  • [1] Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 318 - +
  • [2] Efficient Provable Secure ID-based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Chen, Hua
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 415 - 418
  • [3] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 105 - 108
  • [4] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [5] Provable security of ID-based proxy signature schemes
    Gu, CX
    Zhu, YF
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
  • [6] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116
  • [7] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [8] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [9] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    JournalofElectronics(China), 2008, (02) : 226 - 231
  • [10] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50