Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
Hi-index | 0.00 |
Proxy signature is an important technology in secure e-commerce. Short signature and fast verification are of paramount importance for its practical application. In this paper, we propose a proxy signature key generation protocol in which the warrant is the proxy public key for the first time. This protocol can be combined with ID-based signature scheme from bilinear pairing to construct an ID-based proxy signature scheme. Furthermore, compared with all previous proxy signature schemes, the scheme constructed has two virtues: (1) the proxy signature is shorter because it does not include any parameters for rebuilding the proxy public key; (2) the verification of the proxy signature is faster because the public proxy key does not have to be computed. Also we give such a proxy signature scheme.