Provable security of ID-Based proxy signature schemes

  • Authors:
  • Chunxiang Gu;Yuefei Zhu

  • Affiliations:
  • Network Engineering Department, Information Engineering University, Zhengzhou, P.R. China;Network Engineering Department, Information Engineering University, Zhengzhou, P.R. China

  • Venue:
  • ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

In the last couple of years, identity based cryptography has got fruitful achievements [1,2,3,4]. This paper provides theoretical discussions for the provable-security of ID-based proxy signature primitive. First, we present a general security model for such schemes. Then we describe how to construct an ID-based proxy signature scheme with a secure ID-based signature scheme, and prove the construction's security in the standard model. At last, we analyze the ID-based proxy signature scheme proposed by Zhang et.al.[4], and show that this scheme can be proven to be secure in the random oracle model.