A novel ID-based partial delegation with warrant proxy signature scheme

被引:0
|
作者
Qian, HF [1 ]
Cao, ZF [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
关键词
proxy signature; identity-based signature; provably secure; RSA; random oracle model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Based signature. We also improve the Shamir's ID-Based signature and prove its security under the proposed security notion. Rom the improved Shamir's ID-Based signature scheme we construct an ID-Based proxy signature scheme, the security is based on the underlying ID-based signature scheme. Our scheme is efficient and easy to implement. The scheme simplifies the public key as the user's id and can be easily applied to all the RSA-type cryptosystems.
引用
收藏
页码:323 / 331
页数:9
相关论文
共 50 条
  • [1] ID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
    Lin, Yen-Ching
    Wu, Tzong-Chen
    Tsai, Jia-Lun
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (03) : 441 - 457
  • [2] Secure delegation-by-warrant ID-based proxy signcryption scheme
    Duan, SS
    Cao, ZF
    Zhou, Y
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
  • [3] General secure ID-based proxy signature scheme with multi-delegation
    Tian, Xiu-Xia
    Li, Hong-Jiao
    Wen, Mi
    Wang, Yong
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 710 - 714
  • [4] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [5] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [6] A Secure Proxy Signature Scheme with Delegation by Warrant
    Popescu, Constantin
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2011, 20 (04): : 373 - 380
  • [7] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [8] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [9] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    [J]. Wuhan University Journal of Natural Sciences, 2005, (03) : 555 - 558
  • [10] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +