Efficient certificateless proxy signature scheme with provable security

Seung Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, Seungjoo Kim

    Research output: Contribution to journalArticlepeer-review

    37 Citations (Scopus)

    Abstract

    In this paper we propose a very efficient and provably secure proxy signature scheme with implicit certificate (called "certificateless proxy signature scheme"), where a receiver does not have to verify a certificate before verifying a signed message, yet only the original signer or the proxy signer who properly registered its public key and identity information is able to sign. Unlike traditional approaches which assume a PKI where the original signer and the proxy signer already hold their public keys and digital certificates, our scheme does not need for each user to have a public key and a certificate, thus we can save the time for verifying the original signer's and the proxy signer's certificates in the proxy signature verification phase. Furthermore, we present a formal security model for our scheme under the intractability of the computational Diffie-Hellman problem in the random oracle model.

    Original languageEnglish
    Pages (from-to)322-337
    Number of pages16
    JournalInformation Sciences
    Volume188
    DOIs
    Publication statusPublished - 2012 Apr 1

    Bibliographical note

    Funding Information:
    This research was supported by the MKE (The Ministry of Knowledge Economy), Korea , under the “ITRC” support program supervised by the NIPA (National IT Industry Promotion Agency)” (NIPA-2011-C1090-1001-0004). This work was also supported by the IT Research and Development program of MKE, Korea (Development of Privacy Enhancing Cryptography on Ubiquitous Computing Environment).

    Keywords

    • Certificateless proxy signature
    • Certificateless signature
    • Delegation
    • Provable security
    • Proxy signature

    ASJC Scopus subject areas

    • Software
    • Information Systems and Management
    • Artificial Intelligence
    • Theoretical Computer Science
    • Control and Systems Engineering
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Efficient certificateless proxy signature scheme with provable security'. Together they form a unique fingerprint.

    Cite this