Provable Security of ID-Based Proxy Signature Schemes.

Bibliographic Details
Title: Provable Security of ID-Based Proxy Signature Schemes.
Authors: Lu, Xicheng, Zhao, Wei, Gu, Chunxiang, Zhu, Yuefei
Source: Networking & Mobile Computing; 2005, p1277-1286, 10p
Abstract: In the last couple of years, identity based cryptography has got fruitful achievements [1,2,3,4]. This paper provides theoretical discussions for the provable-security of ID-based proxy signature primitive. First, we present a general security model for such schemes. Then we describe how to construct an ID-based proxy signature scheme with a secure ID-based signature scheme, and prove the construction's security in the standard model. At last, we analyze the ID-based proxy signature scheme proposed by Zhang et.al.[4], and show that this scheme can be proven to be secure in the random oracle model. [ABSTRACT FROM AUTHOR]
Copyright of Networking & Mobile Computing is the property of Springer eBooks and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
DOI: 10.1007/11534310_134
Database: Supplemental Index