Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A novel proxy key generation protocol and its application
Computer Standards & Interfaces
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Secure multiple-times proxy signature scheme
Computer Standards & Interfaces
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A short proxy signature scheme: efficient authentication in the ubiquitous world
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A controllable anonymous proxy signature scheme with revocation
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
A novel anonymous proxy signature scheme
Advances in Multimedia
On provably secure code-based multiple grade proxy signature scheme
International Journal of High Performance Systems Architecture
Hi-index | 0.00 |
Since the concept of proxy signature was introduced in 1996, many proxy signature schemes have been proposed. Among of them, the requirement of proxy signer's privacy protection is needful in some practical applications. In this paper, a new and provably secure anonymous proxy signature scheme from bilinear pairing, which is the organic combination of proxy signature and ring signature, is proposed to provide the privacy protection for the proxy signer. As for the security analysis, we classify the adversaries into three types according to different resources they can obtain and prove in the random oracle model that, the proposed scheme is unforgeable against all kinds of adversaries. Compared with Zhang et al.'s proxy ring signature scheme proposed in 2003, our scheme is more efficient in computation.