An efficient ID-Based proxy signature scheme from pairings

被引:0
|
作者
Gu, Chunxian [1 ]
Zhu, Yuefei [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Network Engn Dept, Zhengzhou 450002, Peoples R China
来源
关键词
ID-based cryptography; proxy signatures; bilinear pairings;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is only one, so our scheme is more efficient comparatively. The new scheme can be proved secure with the hardness assumption of the k-Bilinear Diffie-Hellman Inverse problem, in the random oracle model.
引用
收藏
页码:40 / 50
页数:11
相关论文
共 50 条
  • [31] ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings
    Liu, Yali
    Yin, Xinchun
    Qiu, Liang
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 179 - 183
  • [32] An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption
    柴震川
    曹珍富
    陆荣幸
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (03) : 271 - 278
  • [33] NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS
    Kwangjo Kim
    [J]. JournalofElectronics., 2006, (06) - 900
  • [34] NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS
    Kwangjo Kim
    [J]. Journal of Electronics(China), 2006, (06) : 892 - 900
  • [35] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [36] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 33 - 36
  • [37] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [38] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [39] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [40] Efficient ID-Based Signature Scheme from Bilinear Map
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 301 - 306