Provably secure and efficient proxy signature with untrustworthy proxy signer

被引:0
|
作者
Wang Z.-W. [1 ]
Zheng S.-H. [1 ]
Wang L.-C. [1 ]
Yang Y.-X. [1 ]
Hu Z.-M. [1 ]
机构
[1] Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications
关键词
Factoring; Proxy signature; Untrustworthy proxy signer;
D O I
10.1007/s12204-008-0675-6
中图分类号
学科分类号
摘要
Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme. Copyright.
引用
收藏
页码:675 / 678
页数:3
相关论文
共 50 条
  • [1] Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
    王志伟
    郑世慧
    王励成
    杨义先
    胡正名
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 675 - 678
  • [2] An Efficient and Provably Secure Proxy Signature Scheme
    Zhang, Jianhong
    Xu, Min
    Su, Xiuna
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS, PTS 1 AND 2, 2011, 211-212 : 876 - +
  • [3] An efficient and provably secure proxy signature scheme
    Zhang, Jianhong
    Liu, Xue
    Gao, Shengnan
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [4] A secure strong proxy signature scheme with proxy signer privacy protection
    Lee, Youn-Ho
    Hong, Seong-Min
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 33 - 38
  • [5] Provably secure proxy blind signature scheme
    Kim, Young-Seol
    Chang, Jik-Hyun
    [J]. ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 998 - +
  • [6] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [7] A short provably secure proxy signature scheme
    Li Jin
    Wang Yanming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04) : 721 - 724
  • [8] Revocable proxy signature scheme with efficient multiple delegations to the same proxy signer
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 193 - 197
  • [9] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [10] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    [J]. INFORMATICA, 2010, 21 (02) : 277 - 294