Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Simulatability and security of certificateless threshold signatures
Information Sciences: an International Journal
Identity based proxy multi-signature
Journal of Systems and Software
Certificateless undeniable signature scheme
Information Sciences: an International Journal
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Certificateless multi-proxy signature
Computer Communications
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
An efficient certificateless signature scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A new proxy signature scheme providing self-delegation
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Generic security-amplifying methods of ordinary digital signatures
Information Sciences: an International Journal
Information Sciences: an International Journal
Hi-index | 0.07 |
In this paper we propose a very efficient and provably secure proxy signature scheme with implicit certificate (called ''certificateless proxy signature scheme''), where a receiver does not have to verify a certificate before verifying a signed message, yet only the original signer or the proxy signer who properly registered its public key and identity information is able to sign. Unlike traditional approaches which assume a PKI where the original signer and the proxy signer already hold their public keys and digital certificates, our scheme does not need for each user to have a public key and a certificate, thus we can save the time for verifying the original signer's and the proxy signer's certificates in the proxy signature verification phase. Furthermore, we present a formal security model for our scheme under the intractability of the computational Diffie-Hellman problem in the random oracle model.