UM
Proxy signature in the standard model: constructing security model and proving security
Gu K.3; Jia W.-J.2; Wang S.-C.3; Shi L.-W.3
2012-09-01
Source PublicationRuan Jian Xue Bao/Journal of Software
ISSN10009825
Volume23Issue:9Pages:2416-2429
AbstractCurrent proxy signature schemes are not proved for their security in the complete provable security model of proxy signature. In this paper, we show a complete provable security model for proxy signature based on Boldyreva's provable security model, and a new identity-based proxy signature scheme are proposed in the standard model, which is based on Paterson's scheme. In the complete provable security model for proxy signature, the new scheme is proved to have the existential identity-based proxy signature unforgerability under an adaptive chosen message attack, which has a security reduction to CDHP. Comparing with other proxy signature schemes based on public key cryptosystem in the standard model, the concept of the identity is introduced into the new scheme, and the new scheme is more secure. © 2012 ISCAS.
KeywordCDHP Identity Provable security Proxy signature
DOI10.3724/SP.J.1001.2012.04246
URLView the original
Language英語
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.City University of Hong Kong
2.Central South University China
3.Hunan University
Recommended Citation
GB/T 7714
Gu K.,Jia W.-J.,Wang S.-C.,et al. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software,2012,23(9):2416-2429.
APA Gu K.,Jia W.-J.,Wang S.-C.,&Shi L.-W..(2012).Proxy signature in the standard model: constructing security model and proving security.Ruan Jian Xue Bao/Journal of Software,23(9),2416-2429.
MLA Gu K.,et al."Proxy signature in the standard model: constructing security model and proving security".Ruan Jian Xue Bao/Journal of Software 23.9(2012):2416-2429.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Wang S.-C.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Wang S.-C.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu K.]'s Articles
[Jia W.-J.]'s Articles
[Wang S.-C.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.