TY - GEN
T1 - Designated verifier proxy signature scheme from bilinear pairings
AU - Lu, Rongxing
AU - Cao, Zhenfu
AU - Dong, Xiaolei
AU - Su, Renwang
PY - 2006
Y1 - 2006
N2 - A proxy signature enables an original signer to delegate her signing capability to a proxy signer and the proxy signer can sign a message on behalf of the original signer. Later, anyone accessible to the public keys of the original signer and proxy signer and the corresponding delegation warrant is able to verify the authenticity of a purported proxy signature. Obviously, the "public-verifiable" property here is quite suitable in most application scenarios, however, it is not applicable for some other applications, as in the case that a proxy signed message may be personally or commercially sensitive, for example, in a bill of tax or a bill of health, etc. Thereby, aim at these applications, several designated verifier proxy signature schemes have recently been suggested. However, to our best knowledge, none of these schemes has provided the provable security proof. Therefore, in this paper, based on the bilinear pairing, we would like to propose a new designated verifier proxy signature scheme, and apply the techniques from provable security to analyze its security.
AB - A proxy signature enables an original signer to delegate her signing capability to a proxy signer and the proxy signer can sign a message on behalf of the original signer. Later, anyone accessible to the public keys of the original signer and proxy signer and the corresponding delegation warrant is able to verify the authenticity of a purported proxy signature. Obviously, the "public-verifiable" property here is quite suitable in most application scenarios, however, it is not applicable for some other applications, as in the case that a proxy signed message may be personally or commercially sensitive, for example, in a bill of tax or a bill of health, etc. Thereby, aim at these applications, several designated verifier proxy signature schemes have recently been suggested. However, to our best knowledge, none of these schemes has provided the provable security proof. Therefore, in this paper, based on the bilinear pairing, we would like to propose a new designated verifier proxy signature scheme, and apply the techniques from provable security to analyze its security.
UR - https://www.scopus.com/pages/publications/33845584279
U2 - 10.1109/IMSCCS.2006.252
DO - 10.1109/IMSCCS.2006.252
M3 - 会议稿件
AN - SCOPUS:33845584279
SN - 0769525814
SN - 9780769525815
T3 - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
SP - 40
EP - 47
BT - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
T2 - First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Y2 - 20 April 2006 through 24 April 2006
ER -