Certificateless Proxy Signature Scheme with Provable Security
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    This paper studies proxy signatures in the newly proposed certificateless public key setting. The authorspresent a very strong security model for certificateless proxy signature schemes against both Super Type IAdversary and Super Type II Adversary. And also an efficient construction of certificateless proxy signature schemeusing bilinear maps is put forward. The security of this scheme is based on the infeasibility of the ComputationalDiffie-Hellman problem and is formally proven under the security model of certificateless proxy signature schemes.Due to its security, high efficiency and freedom from certificate management, it may have practical applications inelectronic commerce and mobile agent systems, etc.

    Reference
    Related
    Cited by
Get Citation

陈虎,张福泰,宋如顺.可证安全的无证书代理签名方案.软件学报,2009,20(3):692-701

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 13,2008
  • Revised:October 27,2008
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063