Proxy signature in the standard model : constructing security model and proving security
Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Author(s)
Related Research Unit(s)
Detail(s)
Original language | English |
---|---|
Pages (from-to) | 2416-2429 |
Journal / Publication | Ruan Jian Xue Bao/Journal of Software |
Volume | 23 |
Issue number | 9 |
Publication status | Published - Sept 2012 |
Link(s)
Abstract
Current proxy signature schemes are not proved for their security in the complete provable security model of proxy signature. In this paper, we show a complete provable security model for proxy signature based on Boldyreva's provable security model, and a new identity-based proxy signature scheme are proposed in the standard model, which is based on Paterson's scheme. In the complete provable security model for proxy signature, the new scheme is proved to have the existential identity-based proxy signature unforgerability under an adaptive chosen message attack, which has a security reduction to CDHP. Comparing with other proxy signature schemes based on public key cryptosystem in the standard model, the concept of the identity is introduced into the new scheme, and the new scheme is more secure. © 2012 ISCAS.
Research Area(s)
- CDHP, Identity, Provable security, Proxy signature
Citation Format(s)
Proxy signature in the standard model: constructing security model and proving security. / Gu, Ke; Jia, Wei-Jia; Wang, Si-Chun et al.
In: Ruan Jian Xue Bao/Journal of Software, Vol. 23, No. 9, 09.2012, p. 2416-2429.
In: Ruan Jian Xue Bao/Journal of Software, Vol. 23, No. 9, 09.2012, p. 2416-2429.
Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review