Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
An ID-based proxy multi signature scheme without bilinear pairings
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
ID-based proxy signature scheme with message recovery
Journal of Systems and Software
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Hi-index | 0.01 |
In the last couple of years, identity based cryptography has got fruitful achievements [1,2,3,4]. This paper provides theoretical discussions for the provable-security of ID-based proxy signature primitive. First, we present a general security model for such schemes. Then we describe how to construct an ID-based proxy signature scheme with a secure ID-based signature scheme, and prove the construction's security in the standard model. At last, we analyze the ID-based proxy signature scheme proposed by Zhang et.al.[4], and show that this scheme can be proven to be secure in the random oracle model.