Delegation of signing rights using certificateless proxy signatures

Lei Zhang, Futai Zhang, Qianhong Wu

Research output: Contribution to journalArticlepeer-review

25 Scopus citations

Abstract

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. In the last years, fruitful achievements have been seen in certificateless public key cryptography which has the advantages of no certificate management and no key escrow compared with traditional public key cryptography and identity-based public key cryptography respectively. However, the existing certificateless proxy signature schemes is either insecure or without formal security analysis. In this paper, we formalize the security model of certificateless proxy signature schemes and propose a provably secure certificateless proxy signature scheme with formal security proof under the computational Diffie-Hellman assumption.

Original languageEnglish
Pages (from-to)298-309
Number of pages12
JournalInformation Sciences
Volume184
Issue number1
DOIs
StatePublished - 1 Feb 2012

Keywords

  • Certificateless cryptography
  • Digital signature
  • Information security
  • Message authentication

Fingerprint

Dive into the research topics of 'Delegation of signing rights using certificateless proxy signatures'. Together they form a unique fingerprint.

Cite this