On Constructing Certificateless Proxy Signature from Certificateless Signature  

On Constructing Certificateless Proxy Signature from Certificateless Signature

在线阅读下载全文

作  者:万中美 来学嘉 翁健 洪璇 龙宇 贾巍巍 

机构地区:[1]Department of Computer Science and Engineering,Shanghai Jiaotong University,Shanghai 200240,China [2]College of Science,Hohai University,Nanjing 210098,China [3]Department of Computer Science,Jina University,Guangzhou 510632,China

出  处:《Journal of Shanghai Jiaotong university(Science)》2008年第6期692-694,共3页上海交通大学学报(英文版)

基  金:the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)

摘  要:In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B. Recently many identity-based (ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting. Certificateless cryptography can overcome the key escrow problem. In this paper, we present a general security model for certificateless proxy signature scheme. Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.

关 键 词:certificateless signature proxy signature certificateless proxy signature 

分 类 号:TP301[自动化与计算机技术—计算机系统结构] TN918[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象