Journal of System Simulation
Abstract
Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo, et ah first introduced the notion of proxy signature and a lot of research work can be found on this topic nowadays. To simplify key management, many identity based proxy signature schemes were proposed. However, some existing schemes are vulnerable to proxy key exposure attack. It is necessary to propose a security model for identity based proxy signature schemes against proxy key exposure attack. Then an efficient scheme based on pairings was presented, which is provably secure in the random oracle model. In particular, the new scheme is secure against proxy key exposure attack
Recommended Citation
Hong, Xiaojing and Wang, Bin
(2021)
"New Identify Based Proxy Signature Scheme,"
Journal of System Simulation: Vol. 27:
Iss.
6, Article 27.
DOI: 10.16182/j.cnki.joss.2015.06.027
Available at:
https://dc-china-simulation.researchcommons.org/journal/vol27/iss6/27
First Page
1338
Revised Date
2014-06-30
DOI Link
https://doi.org/10.16182/j.cnki.joss.2015.06.027
Last Page
1347
CLC
TP309
Recommended Citation
Hong Xiaojing, Wang Bin. New Identify Based Proxy Signature Scheme[J]. Journal of System Simulation, 2015, 27(6): 1338-1347.
DOI
10.16182/j.cnki.joss.2015.06.027
Included in
Artificial Intelligence and Robotics Commons, Computer Engineering Commons, Numerical Analysis and Scientific Computing Commons, Operations Research, Systems Engineering and Industrial Engineering Commons, Systems Science Commons