•  
  •  
 

Journal of System Simulation

Abstract

Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo, et ah first introduced the notion of proxy signature and a lot of research work can be found on this topic nowadays. To simplify key management, many identity based proxy signature schemes were proposed. However, some existing schemes are vulnerable to proxy key exposure attack. It is necessary to propose a security model for identity based proxy signature schemes against proxy key exposure attack. Then an efficient scheme based on pairings was presented, which is provably secure in the random oracle model. In particular, the new scheme is secure against proxy key exposure attack

First Page

1338

Revised Date

2014-06-30

Last Page

1347

CLC

TP309

Recommended Citation

Hong Xiaojing, Wang Bin. New Identify Based Proxy Signature Scheme[J]. Journal of System Simulation, 2015, 27(6): 1338-1347.

DOI

10.16182/j.cnki.joss.2015.06.027

Share

COinS