首页 | 本学科首页   官方微博 | 高级检索  
     检索      


On constructing certificateless proxy signature from certificateless signature
Authors:Zhong-mei Wan  Xue-jia Lai  Jian Weng  Xuan Hong  Yu Long  Wei-wei Jia
Institution:(1) Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, 200240, China;(2) College of Science, Hohai University, Nanjing, 210098, China;(3) Department of Computer Science, Jina University, Guangzhou, 510632, China
Abstract:In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
Keywords:certificateless signature  proxy signature  certificateless proxy signature
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号