About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Workshop on Trusted Collaboration

Research Article

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme

Download(Requires a free EAI acccount)
476 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-03354-4_31,
        author={Fengying Li and Qingshui Xue and Jiping Zhang and Zhenfu Cao},
        title={A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme},
        proceedings={3rd International ICST Workshop on Trusted Collaboration},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-03354-4_31}
    }
    
  • Fengying Li
    Qingshui Xue
    Jiping Zhang
    Zhenfu Cao
    Year: 2012
    A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
    TRUSTCOL
    Springer
    DOI: 10.1007/978-3-642-03354-4_31
Fengying Li,*, Qingshui Xue1,*, Jiping Zhang2,*, Zhenfu Cao1,*
  • 1: Shanghai Jiao Tong University
  • 2: East China Normal University
*Contact email: fyli@sjtu.edu.cn, xue-qsh@sjtu.edu.cn, jpzhang@deit.ecnu.edu.cn, zfcao@cs.sjtu.edu.cn

Abstract

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted.

Published
2012-05-11
http://dx.doi.org/10.1007/978-3-642-03354-4_31
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL