Efficient certificateless proxy signature scheme with provable security

Seung Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim

Research output: Contribution to journalArticlepeer-review

35 Citations (Scopus)

Abstract

In this paper we propose a very efficient and provably secure proxy signature scheme with implicit certificate (called "certificateless proxy signature scheme"), where a receiver does not have to verify a certificate before verifying a signed message, yet only the original signer or the proxy signer who properly registered its public key and identity information is able to sign. Unlike traditional approaches which assume a PKI where the original signer and the proxy signer already hold their public keys and digital certificates, our scheme does not need for each user to have a public key and a certificate, thus we can save the time for verifying the original signer's and the proxy signer's certificates in the proxy signature verification phase. Furthermore, we present a formal security model for our scheme under the intractability of the computational Diffie-Hellman problem in the random oracle model.

Original languageEnglish
Pages (from-to)322-337
Number of pages16
JournalInformation Sciences
Volume188
DOIs
Publication statusPublished - 2012 Apr 1

Bibliographical note

Funding Information:
This research was supported by the MKE (The Ministry of Knowledge Economy), Korea , under the “ITRC” support program supervised by the NIPA (National IT Industry Promotion Agency)” (NIPA-2011-C1090-1001-0004). This work was also supported by the IT Research and Development program of MKE, Korea (Development of Privacy Enhancing Cryptography on Ubiquitous Computing Environment).

Keywords

  • Certificateless proxy signature
  • Certificateless signature
  • Delegation
  • Provable security
  • Proxy signature

ASJC Scopus subject areas

  • Software
  • Information Systems and Management
  • Artificial Intelligence
  • Theoretical Computer Science
  • Control and Systems Engineering
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Efficient certificateless proxy signature scheme with provable security'. Together they form a unique fingerprint.

Cite this