An efficient identity-based proxy signature scheme in the standard model with tight reduction

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Identity-based proxy signature (IDPS) is a special signature. It has many applications, such as distribution networks, mobile communication, etc. Numerous IDPS schemes have been proposed. However, most existing IDPS schemes suffer the following shortcoming: loose security reduction. This problem is very important because loose security reduction weakens the security of IDPS and makes IDPS more vulnerable to attack. In this study, based on Kang et al.’s proof technical, we propose a new identity-based proxy signature scheme with a detailed security proof in the standard model. We also reduce the security of our scheme to the hardness assumption of computational Diffie-Hellman. In order to present the advance of our scheme,we make a theory comparison between our schemewith other identity-based proxy signature schemes in terms of security reduction and computational cost. The comparison shows that our scheme has tightest security reduction. What’s more, our scheme needs less computational cost that is almost half of other schemes.

Cite

CITATION STYLE

APA

Hu, X., Lu, H., Xu, H., Wang, J., & Yang, Y. (2015). An efficient identity-based proxy signature scheme in the standard model with tight reduction. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 309–319). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free