Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Proposal of Short Proxy Signature using Pairing
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
Aggregate proxy signature and verifiably encrypted proxy signature
ProvSec'07 Proceedings of the 1st international conference on Provable security
Convertible undeniable proxy signatures: security models and efficient construction
WISA'07 Proceedings of the 8th international conference on Information security applications
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
Short designated verifier proxy signatures
Computers and Electrical Engineering
Strongly unforgeable proxy signature scheme secure in the standard model
Journal of Systems and Software
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.00 |
We present a cryptanalysis on the short proxy signature scheme recently proposed in [11] and propose a novel short proxy signature scheme from bilinear pairings. Compared with the existing proxy signature schemes, the signature length of our scheme is the shortest. Our short proxy signature scheme satisfies all the properties required for proxy signatures. We prove that our scheme is secure in the random oracle model.