An identity-based proxy signature scheme from pairings

被引:0
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy signature enables an original signer to delegate her signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffle-Hellman assumption without using Forking Lemma.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [41] Identity-Based Multi-Proxy Signature Scheme in the Standard Model
    Gu, Ke
    Jia, Weijia
    Zhang, Jianming
    [J]. FUNDAMENTA INFORMATICAE, 2017, 150 (02) : 179 - 210
  • [42] A generic construction of identity-based proxy signature scheme in the standard model
    Hu, Xiaoming
    Xu, Huajie
    Wang, Jian
    Tan, Wenan
    Yang, Yinchun
    [J]. International Journal of Information and Computer Security, 2019, 11 (01) : 83 - 100
  • [43] An identity-based signcryption scheme with short ciphertext from pairings
    Chen, Huiyan
    Lu, Shuwang
    Liu, Zhenhua
    Chen, Qing
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 342 - 351
  • [44] Identity based proxy-signcryption scheme from pairings
    Li, XX
    Chen, KF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
  • [45] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [46] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [47] Short certificate-based proxy signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12):
  • [48] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [49] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303
  • [50] A threshold proxy signature scheme from bilinear pairings
    Lu, Dianjun
    Zhang, Bingru
    Zhao, Haixing
    Li, Xinyan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4664 - +