A Secure Proxy Signature Scheme with Delegation by Warrant

被引:0
|
作者
Popescu, Constantin [1 ]
机构
[1] Univ Oradea, Dept Math & Comp Sci, Oradea 410087, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2011年 / 20卷 / 04期
关键词
Cryptography; proxy signature; proxy signer; delegation; discrete logarithm problem; warrant; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature scheme is a variation of the ordinary digital signature schemes which enables a proxy signer to generate signatures on behalf of an original signer. In this paper, we present a secure proxy signature scheme. Our proxy signature scheme is based on the difficulty of solving the discrete logarithm problem. We prove that our proxy signature scheme meets all the security requirements for a proxy signature scheme.
引用
收藏
页码:373 / 380
页数:8
相关论文
共 50 条
  • [1] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [2] A novel ID-based partial delegation with warrant proxy signature scheme
    Qian, HF
    Cao, ZF
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 323 - 331
  • [3] ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
    Lin, Yen-Ching
    Wu, Tzong-Chen
    Tsai, Jia-Lun
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 441 - 457
  • [4] A new proxy blind signature scheme with warrant
    Xue, QS
    Cao, ZF
    [J]. 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 1386 - 1391
  • [5] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714
  • [6] A Special Proxy Signature Scheme with Multi-warrant
    Zhang, Jianhong
    Chen, Hua
    Gao, Shengnan
    Yang, Yixian
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 147 - +
  • [7] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [8] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Alexandra Boldyreva
    Adriana Palacio
    Bogdan Warinschi
    [J]. Journal of Cryptology, 2012, 25 : 57 - 115
  • [9] Cryptanalysis of new proxy blind signature scheme with warrant
    Li Jiguo
    Zhang Yichen
    Yang Songtao
    [J]. ADVANCES IN COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2005, VOLS 4 A & 4 B, 2005, 4A-4B : 1741 - 1744
  • [10] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625