115
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

An improved efficient identity-based proxy signature in the standard model

, , , &
Pages 22-38 | Received 09 May 2014, Accepted 19 Aug 2015, Published online: 28 Sep 2015

References

  • M. Bellare, A. Boldyreva, and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proc. EUROCRYPT 2004, LNCS 3027, Springer-Verlag, 2004, pp. 171–188.
  • A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, J. Cryptology 25 (2012), pp. 57–115. doi: 10.1007/s00145-010-9082-x
  • R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, J. ACM 51 (2004), pp. 557–594. doi: 10.1145/1008731.1008734
  • F. Cao and Z. Cao, An identity based proxy signature scheme secure in the standard model, Proc. GRC 2010, IEEE Computer Society, 2010, pp. 67–72.
  • X. Cao, L. Xu, and W. Wu, Identity-based proxy signature for cloud service in saas, Proc. INCoS 2012, IEEE Computer Society, 2012, pp. 594–599.
  • D. Galindo, J. Herranz, and E. Kiltz, On the generic construction of identity-based signatures with additional properties, Proc. ASIACRYPT 2006, LNCS 4284, Springer-Verlag, 2006, pp. 178–193.
  • C.X. Gu and Y.F. Zhu, Provable security of ID-based proxy signature schemes, Proc. ICCNMC 2005, Springer-Verlag, 2005, pp. 1277–1286.
  • K. Gu, W. Jia, and C. Jiang, Efficient identity-based proxy signature in the standard model, Comput. J. first published online: November 11(2013), pp. 1–16.
  • S.K.H. Islam and G.P. Biswas, A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings, J. King Saud Univ. Comput. Inf. Sci. 26 (2014), pp. 55–67.
  • K. Kim, D. Hong, and I. Jeong, Identity-based proxy signature from lattices, J. Commun. Netw. 15 (2013), pp. 1–7. doi: 10.1109/JCN.2013.000003
  • B. Lee, H. Kim, and K. Kim, Strong proxy signature and its applications, The 2001 Symposium on Cryptography and Information Security, Springer-Verlag, 2001, pp. 603–608.
  • Z. Liu, Y. Hu, X. Zhang, and F. Li, Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Secur. Commun. Netw. 6 (2013), pp. 69–77. doi: 10.1002/sec.531
  • H. Liu, S. Wang, and M. Liang, New construction of efficient hierarchical identity based signature in the standard model, Int. J. Secur. Appl. 7 (2013), pp. 211–222.
  • J.C.N. Schuldt, K. Matsuura, and K.G. Paterson, Proxy signatures secure against proxy key exposure, Proc. PKC 2008, Springer-Verlag, 2008, pp. 141–161.
  • A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Proceedings of CRYPTO '84, LNCS 196, Springer-Verlag, 1984, pp. 47–53.
  • H. Singh and G.K. Verma, ID-based proxy signature scheme with message recovery, J. Syst. Softw. 85 (2012), pp. 209–214. doi: 10.1016/j.jss.2011.08.018
  • Y. Sun, Y. Yu, X. Zhang, and J. Chai, On the security of an identity-based proxy signature scheme in the standard model, IEICE Trans. Fundam. Electronics Commun. Comput. Sci. E96-A(3) (2013), pp. 721–723. doi: 10.1587/transfun.E96.A.721
  • T. Tsai, Y. Tseng, and T. Wu, Provably secure revocable id-based signature in the standard model, Secur. Commun. Netw. 6 (2013), pp. 1250–1260.
  • F. Wen, S. Cui, and J. Cui, An ID-based proxy signature scheme secure against proxy key exposure, Int. J. Adv. Comput. Technol. 3 (2011), pp. 108–116.
  • J. Xu, Z. Zhang, and D. Feng, ID-Based proxy signature using bilinear pairings, Proc. ISPA 2005, Springer-Verlag, 2005, pp. 359–367.
  • F. Zhang and K. Kim, Efficient id-based blind signature and proxy signature from bilinear pairings, Proc. ACISP 2003, LNCS 2727, Springer-Verlag, 2003, pp. 312–323.
  • L. Zhang, Y. Hu, and Q. Wu, New identity-based short signature without random oracles, Procedia Eng. 15 (2011), pp. 3445–3449. doi: 10.1016/j.proeng.2011.08.645

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.