Provably secure proxy-protected signature schemes based on RSA

被引:28
|
作者
Shao, Zuhua [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Dept Computer & Elect Engn, Hangzhou 310023, Zhejiang, Peoples R China
关键词
Cryptography; Proxy signature; Factoring; Random oracle model; DIGITAL-SIGNATURES;
D O I
10.1016/j.compeleceng.2008.11.028
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signature schemes previously proposed in literatures are based on discrete logarithms or from pairings. In 2003, Shao proposed the first two proxy signature schemes based on RSA. Though being very efficient, they have no formal security proofs. In this paper, we provide formal security proofs under a strong security model in the random oracle model after minor modification. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:497 / 505
页数:9
相关论文
共 50 条
  • [1] Provably secure proxy-protected signature schemes based on factoring
    Zhou, Y
    Cao, ZF
    Lu, RX
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 83 - 98
  • [2] Attacks on provably secure proxy-protected signature schemes based on factoring
    Wu, Chia-Chi
    Chang, Chin-Chen
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
  • [3] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
    Naji, Akram A. M.
    Abu Hasan, Yahya
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264
  • [4] Proxy-protected signature secure against the undelegated proxy signature attack
    Liu, Yu-Chuan
    Wen, Hsiang-An
    Lin, Chun-Li
    Hwang, Tzonelih
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (03) : 177 - 185
  • [5] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [6] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [7] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [8] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [9] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [10] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197