首页 | 本学科首页   官方微博 | 高级检索  
     


Delegation of signing rights using certificateless proxy signatures
Authors:Lei Zhang  Futai Zhang  Qianhong Wu
Affiliation:1. College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China;2. School of Computing and Information Technology, University of Wollongong, Wollongong, NSW 2522, Australia;1. Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan 84156-83111, Iran;2. Institute of Cybersecurity and Cryptology, School of Computing and Information Technology University of Wollongong, Wollongong, NSW 2522, Australia
Abstract:A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. In the last years, fruitful achievements have been seen in certificateless public key cryptography which has the advantages of no certificate management and no key escrow compared with traditional public key cryptography and identity-based public key cryptography respectively. However, the existing certificateless proxy signature schemes is either insecure or without formal security analysis. In this paper, we formalize the security model of certificateless proxy signature schemes and propose a provably secure certificateless proxy signature scheme with formal security proof under the computational Diffie–Hellman assumption.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号