Provably Secure Short Proxy Signature Scheme from Bilinear Maps

被引:0
|
作者
胡国政 [1 ,2 ]
洪帆 [1 ]
机构
[1] School of Computer Science and Technology,Huazhong University of Science and Technology
[2] School of Science,Wuhan University of Technology
关键词
Security model; Provable security; Proxy signature; Bilinear maps;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
An enhanced formal model of security for proxy signature schemes is presented and a provably secure short proxy signature scheme is proposed from bilinear maps. The proposed proxy signature scheme is based on two short secure signature schemes. One is used for delegating the signing rights and computing the standard signature;the other is used for computing proxy signature. Finally,a security proof of the proposed proxy signature scheme is showed by reducing tightly the security of the proposed proxy signature scheme to the security of the two basic signature schemes. The proposed proxy signature scheme has the shortest ordinary signatures and proxy signatures. Moreover,the proxy signature generation needs no pairing operation and verification needs just two pairing operation.
引用
收藏
页码:199 / 206
页数:8
相关论文
共 50 条
  • [1] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    Hu Guozheng
    Hong Fan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 736 - 739
  • [2] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    胡国政
    洪帆
    [J]. Journal of Southwest Jiaotong University(English Edition), 2009, 17 (03) - 206
  • [3] A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
    Wang Aiqin Li Jiguo Wang Zhijian (College of Computer & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (03) : 298 - 304
  • [4] Provably-secure proxy signature scheme from bilinear pairings
    Xu, Feng
    Cui, Jun
    Huang, Hao
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (03): : 439 - 443
  • [5] A short provably secure proxy signature scheme
    Li Jin
    Wang Yanming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04) : 721 - 724
  • [6] Short and provably secure designated verifier proxy signature scheme
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    [J]. IET INFORMATION SECURITY, 2016, 10 (02) : 69 - 79
  • [7] A provably secure short transitive signature scheme from bilinear group pairs
    Shahandashti, SF
    Saimasizadeh, M
    Mohajeri, J
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 60 - 76
  • [8] Provably secure proxy signature scheme from factorization
    Yu, Yong
    Mu, Yi
    Susilo, Willy
    Sun, Ying
    Ji, Yafu
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1160 - 1168
  • [9] Efficient and provably-secure certificateless short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 390 - 394
  • [10] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569