A model of bilinear-pairings based designated-verifier proxy signatue scheme

Fengying Li*, Qingshui Xue, Jiping Zhang, Zhenfu Cao

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon's ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted..

Original languageEnglish
Title of host publicationCollaborative Computing
Subtitle of host publicationNetworking, Applications and Worksharing - 4th International Conference, CollaborateCom 2008, Revised Selected Papers
Pages416-424
Number of pages9
DOIs
StatePublished - 2009
Externally publishedYes
Event4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008 - Orlando, FL, United States
Duration: 13 Nov 200816 Nov 2008

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume10 LNICST
ISSN (Print)1867-8211

Conference

Conference4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008
Country/TerritoryUnited States
CityOrlando, FL
Period13/11/0816/11/08

Fingerprint

Dive into the research topics of 'A model of bilinear-pairings based designated-verifier proxy signatue scheme'. Together they form a unique fingerprint.

Cite this