An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption

被引:0
|
作者
柴震川
曹珍富
陆荣幸
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
ID-based cryptography; proxy signature; bilinear pairings; provable security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointchval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
引用
收藏
页码:271 / 278
页数:8
相关论文
共 50 条
  • [31] A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
    Shen, Limin
    Ma, Jianfeng
    Liu, Ximeng
    Wei, Fushan
    Miao, Meixia
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 546 - 554
  • [32] Secure vehicular communications based on group signature and ID-based signature scheme
    Sun, Xiaoting
    Lin, Xiaodong
    Ho, Pin-Han
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
  • [33] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 33 - 36
  • [34] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [35] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [36] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [37] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [38] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [39] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [40] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +