Proxy signature in the standard model : constructing security model and proving security

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

2 Scopus Citations
View graph of relations

Author(s)

  • Ke Gu
  • Wei-Jia Jia
  • Si-Chun Wang
  • Liang-Wu Shi

Related Research Unit(s)

Detail(s)

Original languageEnglish
Pages (from-to)2416-2429
Journal / PublicationRuan Jian Xue Bao/Journal of Software
Volume23
Issue number9
Publication statusPublished - Sep 2012

Abstract

Current proxy signature schemes are not proved for their security in the complete provable security model of proxy signature. In this paper, we show a complete provable security model for proxy signature based on Boldyreva's provable security model, and a new identity-based proxy signature scheme are proposed in the standard model, which is based on Paterson's scheme. In the complete provable security model for proxy signature, the new scheme is proved to have the existential identity-based proxy signature unforgerability under an adaptive chosen message attack, which has a security reduction to CDHP. Comparing with other proxy signature schemes based on public key cryptosystem in the standard model, the concept of the identity is introduced into the new scheme, and the new scheme is more secure. © 2012 ISCAS.

Research Area(s)

  • CDHP, Identity, Provable security, Proxy signature

Citation Format(s)

Proxy signature in the standard model : constructing security model and proving security. / Gu, Ke; Jia, Wei-Jia; Wang, Si-Chun; Shi, Liang-Wu.

In: Ruan Jian Xue Bao/Journal of Software, Vol. 23, No. 9, 09.2012, p. 2416-2429.

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review