Efficient self-certified proxy CAE scheme and its variants

被引:7
|
作者
Wu, Tzong-Sun [2 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
关键词
Self-certified; Proxy signature; Authenticated encryption; Convertible; AUTHENTICATED ENCRYPTION SCHEMES; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.jss.2008.12.040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an authenticated ciphertext on behalf of the original signer. To satisfy the requirement of confidentiality, only the designated recipient is capable of decrypting the ciphertext and verifying the proxy signature. A significant advantage of the proposed schemes is that the proxy signature conversion process takes no extra cost, i.e., when the case of a later dispute over repudiation occurs, the designated recipient can easily reveal the ordinary proxy signature for the public arbitration. If needed, the designated recipient can also convince anyone that he is the real recipient. In addition, integrating with self-certified public key systems, our schemes can earn more computational efficiency, since authenticating the public key and verifying the proxy signature can be simultaneously carried out within one-step. (c) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:974 / 980
页数:7
相关论文
共 50 条
  • [31] SELF-CERTIFIED PUBLIC KEYS
    GIRAULT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 490 - 497
  • [32] Security of self-certified signatures
    Shao, Zuhua
    INFORMATION PROCESSING LETTERS, 2009, 109 (20) : 1147 - 1150
  • [33] Improvement of threshold signature scheme using self-certified public key
    Li, Jiguo
    Zhang, Yichen
    Wang, Zhijian
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 480 - +
  • [34] An Efficient Anonymous Batch Authenticated and Key Agreement Scheme Using Self-Certified Public Keys in VANETs
    Wang, Xinyi
    Huang, Zheng
    Wen, Qiaoyan
    Zhang, Hua
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [36] Distributed Private-Key Generation Scheme with Self-Certified Identity
    Xie, Yongming
    Wang, Guojun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 501 - 508
  • [37] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [38] Provably Secure Lattice-Based Self-Certified Signature Scheme
    Yang, Qiang
    Li, Daofeng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [39] Cryptanalysis of group signature scheme using self-certified public keys
    Sun, HM
    Chen, BJ
    Hwang, T
    ELECTRONICS LETTERS, 1999, 35 (22) : 1938 - 1939
  • [40] Secure self-certified COTS
    Debbabi, M
    Giasson, E
    Ktari, B
    Michaud, F
    Tawbi, N
    IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 183 - 188