计算机科学
代表
公钥密码术
代理(统计)
计算机安全
证书
计算机网络
随机预言
数字签名
理论计算机科学
加密
散列函数
程序设计语言
机器学习
作者
Harendra Singh,Girraj Kumar Verma
标识
DOI:10.1016/j.jss.2011.08.018
摘要
A proxy signature scheme, introduced by Mambo, Usuda and Okamoto, allows an entity to delegate its signing rights to another entity. Identity based public key cryptosystems are a good alternative for a certificate based public key setting, especially when efficient key management and moderate security are required. From inception several ID-based proxy signature schemes have been discussed, but no more attention has been given to proxy signature with message recovery. In this paper, we are proposing provably secure ID-based proxy signature scheme with message recovery and we have proved that our scheme is secure as existential forgery-adaptively chosen message and ID attack. As proposed scheme is efficient in terms of communication overhead and security, it can be a good alternative for certificate based proxy signatures, used in various applications such as wireless e-commerce, mobile agents, mobile communication and distributed shared object systems, etc.
科研通智能强力驱动
Strongly Powered by AbleSci AI