Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A controllable anonymous proxy signature scheme with revocation
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Forgeability attack of two DLP-base proxy blind signature schemes
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part II
Delegation of signing rights using certificateless proxy signatures
Information Sciences: an International Journal
ID-based proxy signature scheme with message recovery
Journal of Systems and Software
An identity-based proxy signature scheme from pairings
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
A special proxy signature scheme with multi-warrant
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Secure proxy signature schemes from the Weil pairing
The Journal of Supercomputing
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Hi-index | 0.00 |
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes and propose a scheme based on the bilinear pairings. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model.