Provably secure certificateless proxy signature scheme in the standard model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Provably Secure Certificateless Proxy Signature Scheme

Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...

متن کامل

A Certificateless Proxy Signature Scheme Secure In Standard Model

A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer’s agreement on the signed message. There exist several certificateless proxy signature schemes in the literature, but all of the...

متن کامل

A Provably Secure Proxy Signature Scheme in Certificateless Cryptography

A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of certificateless public key cryptography was int...

متن کامل

A Provably Secure Ring Signature Scheme in Certificateless Cryptography

Ring signature is a kind of group-oriented signature. It allows amember of a group to sign messages on behalf of the group withoutrevealing his/her identity. Certificateless public key cryptography wasfirst introduced by Al-Riyami and Paterson in Asiacrypt 2003. Incertificateless cryptography, it does not require the use of certificatesto guarantee the authenticity of users’...

متن کامل

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model

Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certific...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2016

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2016.05.019