Residential College | false |
Status | 已發表Published |
Proxy signature in the standard model: constructing security model and proving security | |
Gu K.3; Jia W.-J.2; Wang S.-C.3; Shi L.-W.3 | |
2012-09-01 | |
Source Publication | Ruan Jian Xue Bao/Journal of Software |
ISSN | 10009825 |
Volume | 23Issue:9Pages:2416-2429 |
Abstract | Current proxy signature schemes are not proved for their security in the complete provable security model of proxy signature. In this paper, we show a complete provable security model for proxy signature based on Boldyreva's provable security model, and a new identity-based proxy signature scheme are proposed in the standard model, which is based on Paterson's scheme. In the complete provable security model for proxy signature, the new scheme is proved to have the existential identity-based proxy signature unforgerability under an adaptive chosen message attack, which has a security reduction to CDHP. Comparing with other proxy signature schemes based on public key cryptosystem in the standard model, the concept of the identity is introduced into the new scheme, and the new scheme is more secure. © 2012 ISCAS. |
Keyword | Cdhp Identity Provable Security Proxy Signature |
DOI | 10.3724/SP.J.1001.2012.04246 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-84867471552 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | University of Macau |
Affiliation | 1.City University of Hong Kong 2.Central South University China 3.Hunan University |
Recommended Citation GB/T 7714 | Gu K.,Jia W.-J.,Wang S.-C.,et al. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429. |
APA | Gu K.., Jia W.-J.., Wang S.-C.., & Shi L.-W. (2012). Proxy signature in the standard model: constructing security model and proving security. Ruan Jian Xue Bao/Journal of Software, 23(9), 2416-2429. |
MLA | Gu K.,et al."Proxy signature in the standard model: constructing security model and proving security".Ruan Jian Xue Bao/Journal of Software 23.9(2012):2416-2429. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment