Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme
نویسندگان
چکیده
In this paper, we first construct a security model for delegation-bywarrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has been done. Then we present such a scheme based on the bilinear pairings, and show that it is provably secure in the random oracle model. Specifically, we prove its semantic security under the DBDH assumption and its unforgeability under the BDH assumption.
منابع مشابه
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network connections in limited period of time. Therefore, privilege delegation mechanism has become a necessary service in modern enterprises and organi...
متن کاملAn Efficient ID-Based Proxy Signcryption Scheme
Received June 30 th , 2012 Revised July 10 th , 2012 Accepted July 22 th , 2012 Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications ...
متن کاملID-Based Aggregate Proxy Signature Scheme Realizing Warrant-Based Delegation
This paper proposes a novel ID-based aggregate proxy signature scheme that realizes a warrant-based delegation for an original signer to transfer his/her signing power to a given set of proxy signers. Our proposed scheme allows n distinct proxy signers to sign n distinct messages in such a way that these n individual signatures can be aggregated into a single one without expansion. In the pract...
متن کاملAn Improved Threshold Proxy Signature Scheme Based on RSA
This paper proposes an improved RSA-based threshold proxy signature scheme. The proposed scheme satisfies the necessary security requirements of proxy signature such as verifiability, unforgeability, threshold property and identifiability. The proposed scheme does not require any secure channel to deliver the proxy keys any more. Introduction A proxy signature scheme involves three entities: an...
متن کاملEfficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings
Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005