An identity-based proxy signature scheme from pairings

被引:0
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy signature enables an original signer to delegate her signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffle-Hellman assumption without using Forking Lemma.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [1] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [2] An identity-based proxy ring signature scheme from bilinear pairings
    Cheng, WQ
    Lang, WM
    Yang, ZK
    Liu, G
    Tan, YM
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 424 - 429
  • [3] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [4] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    [J]. INFORMATICA, 2010, 21 (01) : 41 - 56
  • [5] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
  • [6] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [7] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 55 - 67
  • [8] An efficient identity-based short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 725 - +
  • [9] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings
    Liu Xin
    Xu Qiu-liang
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
  • [10] An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
    Wen, Yihong
    Peng, Cong
    Wang, Shicheng
    Li, Li
    Luo, Min
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 42 - 55