Skip to main content
Log in

Provably secure and efficient proxy signature with untrustworthy proxy signer

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign message[J]. IEICE Trans Funct, 1996, E79-A(9): 1338–1354.

    Google Scholar 

  2. Zhang F, Safavi-Naini R, Susilo W. An efficient signature scheme from billinear pairing and its applications [C]//Public Key Cryptography — PKC 2004, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004: 277–290.

    Google Scholar 

  3. Lu R, Dong X, Cao Z. Designing efficient proxy signature schemes for mobile communication [J]. Sci China Ser F-Inf Sci, 2008, 51(2): 183–195.

    Article  MATH  Google Scholar 

  4. Lu R, Cao Z, Zhu H. A robust (k, n)+1 threshold proxy signature scheme based on factoring[J]. Appl Math Comput, 2005, 166(1):35–45.

    Article  MATH  MathSciNet  Google Scholar 

  5. Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers [J]. J Syst Software, 2001, 58(2): 119–124.

    Article  MathSciNet  Google Scholar 

  6. Yi L, Bai G, Xiao G. Proxy multi-signature scheme: A new type of proxy signature scheme [J]. Electr Lett, 2000, 36(6): 527–528.

    Article  Google Scholar 

  7. Wu C-K. Set signatures and their applications [C]// 3rd Security Protocol Symposium, Proceeding of 3rd Security Protocol Symposium. Beijing: IEEE Press, 2007: 19–33.

    Google Scholar 

  8. Pointcheval D, Stern J. Security proofs for signature schemes [C]//Advances in Cryptology — EUROCRYPT’ 96, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996: 387–398.

    Google Scholar 

  9. Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures [J]. J Cryptology, 2000, 13: 361–396.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-wei Wang  (王志伟).

Additional information

Foundation item: the National Basic Research Program (973) of China (No. 2007CB31074); the National Natural Science Foundation of China (No. 90718001)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Zw., Zheng, Sh., Wang, Lc. et al. Provably secure and efficient proxy signature with untrustworthy proxy signer. J. Shanghai Jiaotong Univ. (Sci.) 13, 675–678 (2008). https://doi.org/10.1007/s12204-008-0675-6

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0675-6

Key words

CLC number

Navigation