We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential aggregate signatures; our construction provides a benchmark by which future specific constructions may be judged. Finally, we consider the extension of our model and constructions to the identity-based setting. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Schuldt, J. C. N., Matsuura, K., & Paterson, K. G. (2008). Proxy signatures secure against proxy key exposure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4939 LNCS, pp. 141–161). https://doi.org/10.1007/978-3-540-78440-1_9
Mendeley helps you to discover research relevant for your work.