Provably secure proxy-protected signature schemes based on RSA

被引:28
|
作者
Shao, Zuhua [1 ]
机构
[1] Zhejiang Univ Sci & Technol, Dept Computer & Elect Engn, Hangzhou 310023, Zhejiang, Peoples R China
关键词
Cryptography; Proxy signature; Factoring; Random oracle model; DIGITAL-SIGNATURES;
D O I
10.1016/j.compeleceng.2008.11.028
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Most of proxy signature schemes previously proposed in literatures are based on discrete logarithms or from pairings. In 2003, Shao proposed the first two proxy signature schemes based on RSA. Though being very efficient, they have no formal security proofs. In this paper, we provide formal security proofs under a strong security model in the random oracle model after minor modification. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:497 / 505
页数:9
相关论文
共 50 条
  • [21] Provably secure and efficient proxy signature with untrustworthy proxy signer
    Wang Z.-W.
    Zheng S.-H.
    Wang L.-C.
    Yang Y.-X.
    Hu Z.-M.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 (6) : 675 - 678
  • [22] Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
    王志伟
    郑世慧
    王励成
    杨义先
    胡正名
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 675 - 678
  • [23] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [24] Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
    Tang, Shaohua
    Xu, Lingling
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 91 - 97
  • [25] Provably Secure Proxy Multi-Signature Scheme Based on ECC
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 199 - 204
  • [26] A provably secure certificateless organizational signature schemes
    Allam, Ali M.
    Ali, Ihab A.
    Mahgoub, Shereen M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (05)
  • [27] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    [J]. INFORMATICA, 2010, 21 (02) : 277 - 294
  • [28] Provably secure proxy signature scheme from factorization
    Yu, Yong
    Mu, Yi
    Susilo, Willy
    Sun, Ying
    Ji, Yafu
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1160 - 1168
  • [29] On the proxy-protected property of Chen et al.'s proxy multisignature schemes
    Huang, Pei-Hui
    Wen, Hsiang-An
    Wang, Chih-Hung
    Hwang, Tzonelih
    [J]. INFORMATICA, 2007, 18 (01) : 55 - 60
  • [30] Secure efficient proxy blind signature schemes based DLP
    Wang, SB
    Hong, F
    Cui, GH
    [J]. CEC 2005: Seventh IEEE International Conference on E-Commerce Technology, Proceedings, 2005, : 452 - 455