ID-based proxy signature using bilinear pairings

87Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes and propose a scheme based on the bilinear pairings. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Xu, J., Zhang, Z., & Feng, D. (2005). ID-based proxy signature using bilinear pairings. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3759 LNCS, pp. 359–367). Springer Verlag. https://doi.org/10.1007/11576259_40

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free