Residential College | false |
Status | 已發表Published |
Secure and efficient proxy signature scheme in the standard model | |
Gu K.3; Jia W.2; Chen R.1; Liu X.3 | |
2013-10-01 | |
Source Publication | Chinese Journal of Electronics |
ISSN | 10224653 |
Volume | 22Issue:4Pages:666-670 |
Abstract | Existing proxy signature schemes are not proved to have complete security in the provable security model for proxy signature, whether the schemes are secure needs to be further studied. We show a generalized provable security model for proxy signature. Comparing with Boldyreva's security model, we introduce Schuldt's work to our security model. We propose a secure proxy signature scheme, which is based on Waters' signature scheme in the standard model. Comparing with other proxy signature schemes having a reduction to CDH assumption in the standard model, our scheme is more secure and efficient. |
Keyword | Computational diffle-hellman (cdh) assumption Efficiency Provable security Proxy signature Security model |
URL | View the original |
Language | 英語English |
Fulltext Access | |
Document Type | Journal article |
Collection | University of Macau |
Affiliation | 1.Hunan University of Commerce 2.City University of Hong Kong 3.Central South University China |
Recommended Citation GB/T 7714 | Gu K.,Jia W.,Chen R.,et al. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670. |
APA | Gu K.., Jia W.., Chen R.., & Liu X. (2013). Secure and efficient proxy signature scheme in the standard model. Chinese Journal of Electronics, 22(4), 666-670. |
MLA | Gu K.,et al."Secure and efficient proxy signature scheme in the standard model".Chinese Journal of Electronics 22.4(2013):666-670. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment