Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Proxy signature schemes based on factoring
Information Processing Letters
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Secure multiple-times proxy signature scheme
Computer Standards & Interfaces
A generic construction for proxy signature scheme
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Hi-index | 0.00 |
Proxy signature is an active cryptographic research area, and a wide range of literature can be found nowadays suggesting improvement and generalization of existing protocols in various direction. However, most of previously proposed schemes in these literatures are based on discrete logarithm problems. To our best knowledge, there still doesn’t exist an indeed proxy signature scheme based on factoring. The paper present a new proxy signature scheme based on factoring, along with a complete proof of security in the Random Oracle model. The proposed scheme does not need a secure channel to transmit proxy private key.