On constructing certificateless proxy signature from certificateless signature |
| |
Authors: | Zhong-mei Wan Xue-jia Lai Jian Weng Xuan Hong Yu Long Wei-wei Jia |
| |
Affiliation: | (1) Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai, 200240, China;(2) College of Science, Hohai University, Nanjing, 210098, China;(3) Department of Computer Science, Jina University, Guangzhou, 510632, China |
| |
Abstract: | In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme. |
| |
Keywords: | certificateless signature proxy signature certificateless proxy signature |
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录! |
|