References
- M. Bellare, A. Boldyreva, and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Proc. EUROCRYPT 2004, LNCS 3027, Springer-Verlag, 2004, pp. 171–188.
- A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, J. Cryptology 25 (2012), pp. 57–115. doi: 10.1007/s00145-010-9082-x
- R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, J. ACM 51 (2004), pp. 557–594. doi: 10.1145/1008731.1008734
- F. Cao and Z. Cao, An identity based proxy signature scheme secure in the standard model, Proc. GRC 2010, IEEE Computer Society, 2010, pp. 67–72.
- X. Cao, L. Xu, and W. Wu, Identity-based proxy signature for cloud service in saas, Proc. INCoS 2012, IEEE Computer Society, 2012, pp. 594–599.
- D. Galindo, J. Herranz, and E. Kiltz, On the generic construction of identity-based signatures with additional properties, Proc. ASIACRYPT 2006, LNCS 4284, Springer-Verlag, 2006, pp. 178–193.
- C.X. Gu and Y.F. Zhu, Provable security of ID-based proxy signature schemes, Proc. ICCNMC 2005, Springer-Verlag, 2005, pp. 1277–1286.
- K. Gu, W. Jia, and C. Jiang, Efficient identity-based proxy signature in the standard model, Comput. J. first published online: November 11(2013), pp. 1–16.
- S.K.H. Islam and G.P. Biswas, A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings, J. King Saud Univ. Comput. Inf. Sci. 26 (2014), pp. 55–67.
- K. Kim, D. Hong, and I. Jeong, Identity-based proxy signature from lattices, J. Commun. Netw. 15 (2013), pp. 1–7. doi: 10.1109/JCN.2013.000003
- B. Lee, H. Kim, and K. Kim, Strong proxy signature and its applications, The 2001 Symposium on Cryptography and Information Security, Springer-Verlag, 2001, pp. 603–608.
- Z. Liu, Y. Hu, X. Zhang, and F. Li, Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Secur. Commun. Netw. 6 (2013), pp. 69–77. doi: 10.1002/sec.531
- H. Liu, S. Wang, and M. Liang, New construction of efficient hierarchical identity based signature in the standard model, Int. J. Secur. Appl. 7 (2013), pp. 211–222.
- J.C.N. Schuldt, K. Matsuura, and K.G. Paterson, Proxy signatures secure against proxy key exposure, Proc. PKC 2008, Springer-Verlag, 2008, pp. 141–161.
- A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Proceedings of CRYPTO '84, LNCS 196, Springer-Verlag, 1984, pp. 47–53.
- H. Singh and G.K. Verma, ID-based proxy signature scheme with message recovery, J. Syst. Softw. 85 (2012), pp. 209–214. doi: 10.1016/j.jss.2011.08.018
- Y. Sun, Y. Yu, X. Zhang, and J. Chai, On the security of an identity-based proxy signature scheme in the standard model, IEICE Trans. Fundam. Electronics Commun. Comput. Sci. E96-A(3) (2013), pp. 721–723. doi: 10.1587/transfun.E96.A.721
- T. Tsai, Y. Tseng, and T. Wu, Provably secure revocable id-based signature in the standard model, Secur. Commun. Netw. 6 (2013), pp. 1250–1260.
- F. Wen, S. Cui, and J. Cui, An ID-based proxy signature scheme secure against proxy key exposure, Int. J. Adv. Comput. Technol. 3 (2011), pp. 108–116.
- J. Xu, Z. Zhang, and D. Feng, ID-Based proxy signature using bilinear pairings, Proc. ISPA 2005, Springer-Verlag, 2005, pp. 359–367.
- F. Zhang and K. Kim, Efficient id-based blind signature and proxy signature from bilinear pairings, Proc. ACISP 2003, LNCS 2727, Springer-Verlag, 2003, pp. 312–323.
- L. Zhang, Y. Hu, and Q. Wu, New identity-based short signature without random oracles, Procedia Eng. 15 (2011), pp. 3445–3449. doi: 10.1016/j.proeng.2011.08.645