Abstract
Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign message[J]. IEICE Trans Funct, 1996, E79-A(9): 1338–1354.
Zhang F, Safavi-Naini R, Susilo W. An efficient signature scheme from billinear pairing and its applications [C]//Public Key Cryptography — PKC 2004, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 2004: 277–290.
Lu R, Dong X, Cao Z. Designing efficient proxy signature schemes for mobile communication [J]. Sci China Ser F-Inf Sci, 2008, 51(2): 183–195.
Lu R, Cao Z, Zhu H. A robust (k, n)+1 threshold proxy signature scheme based on factoring[J]. Appl Math Comput, 2005, 166(1):35–45.
Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers [J]. J Syst Software, 2001, 58(2): 119–124.
Yi L, Bai G, Xiao G. Proxy multi-signature scheme: A new type of proxy signature scheme [J]. Electr Lett, 2000, 36(6): 527–528.
Wu C-K. Set signatures and their applications [C]// 3rd Security Protocol Symposium, Proceeding of 3rd Security Protocol Symposium. Beijing: IEEE Press, 2007: 19–33.
Pointcheval D, Stern J. Security proofs for signature schemes [C]//Advances in Cryptology — EUROCRYPT’ 96, Lecture Notes in Computer Science. Berlin: Springer-Verlag, 1996: 387–398.
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures [J]. J Cryptology, 2000, 13: 361–396.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Basic Research Program (973) of China (No. 2007CB31074); the National Natural Science Foundation of China (No. 90718001)
Rights and permissions
About this article
Cite this article
Wang, Zw., Zheng, Sh., Wang, Lc. et al. Provably secure and efficient proxy signature with untrustworthy proxy signer. J. Shanghai Jiaotong Univ. (Sci.) 13, 675–678 (2008). https://doi.org/10.1007/s12204-008-0675-6
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-008-0675-6