A new generic construction of proxy signatures under enhanced security models

Kee Sung Kim, Ik Rae Jeong

Research output: Contribution to journalArticlepeer-review


A proxy signature scheme allows an entity to delegate his signing capabilities to another. Many schemes have been provided for use in numerous applications such as distributed computing, grid computing, and mobile communications. In 2003, Boldyreva et al. introduced the first formal security model of proxy signatures and also proposed a generic construction secure in their model. However, an adversary can arbitrarily alter the warrants of the proxy signatures because the warrants are not explicitly considered in their model. To solve this problem, Huang et al. provided an enhanced security model of proxy signatures in 2005. Some proxy signatures secure in this security model have been proposed but there is no generic construction yet. In this paper, we redefine and improve the Huang et al.'s security model in terms of multi-user and then provide a new generic construction of proxy signatures secure against our enhanced security model based on ID-based signatures. Moreover, we can make a lattice-based proxy signature scheme in the standard model from our result.

Original languageEnglish
Pages (from-to)975-981
Number of pages7
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Issue number4
Publication statusPublished - 2015 Apr 1

Bibliographical note

Publisher Copyright:
Copyright © 2015 The Institute of Electronics, Information and Communication Engineers.


  • Generic construction
  • ID-based signature
  • Lattice
  • Proxy signature

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics


Dive into the research topics of 'A new generic construction of proxy signatures under enhanced security models'. Together they form a unique fingerprint.

Cite this