Delegation of signing rights using certificateless proxy signatures

  • Authors:
  • Lei Zhang;Futai Zhang;Qianhong Wu

  • Affiliations:
  • Software Engineering Institute, East China Normal University, Shanghai, China and UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Ca ...;School of Computer Science and Technology, Nanjing Normal University, Nanjing, China and Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology, Nanjing, Chi ...;UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili, Catalonia, Spain and Wuhan University, School of Computer, Key Lab. of Aerospace Inf ...

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2012

Quantified Score

Hi-index 0.07

Visualization

Abstract

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. In the last years, fruitful achievements have been seen in certificateless public key cryptography which has the advantages of no certificate management and no key escrow compared with traditional public key cryptography and identity-based public key cryptography respectively. However, the existing certificateless proxy signature schemes is either insecure or without formal security analysis. In this paper, we formalize the security model of certificateless proxy signature schemes and propose a provably secure certificateless proxy signature scheme with formal security proof under the computational Diffie-Hellman assumption.