An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption

被引:0
|
作者
柴震川
曹珍富
陆荣幸
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
ID-based cryptography; proxy signature; bilinear pairings; provable security;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointchval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
引用
收藏
页码:271 / 278
页数:8
相关论文
共 50 条
  • [21] ID-based proxy signature scheme with message recovery
    Singh, Harendra
    Verma, Girraj Kumar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (01) : 209 - 214
  • [22] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922
  • [23] A New ID-Based Proxy Blind Signature Scheme
    LANG Wei-min~1
    2. People’s Liberation Army Institute of Communications Command
    WuhanUniversityJournalofNaturalSciences, 2005, (03) : 555 - 558
  • [24] New ID-based proxy blind signature scheme
    Lang, Wei-Min
    Yang, Zong-Kai
    Cheng, Wen-Qing
    Tan, Yun-Meng
    Wuhan University Journal of Natural Sciences, 2005, 10 (03) : 555 - 558
  • [25] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [26] Secure ID-based proxy signcryption scheme with designated proxy signcrypter
    Tian, Xiu-Xia
    Xu, Jian-Ping
    Li, Hong-Jiao
    Peng, Yuan
    Zhang, An-Qin
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
  • [27] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [28] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [29] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [30] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +