Abstract
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B. Recently many identity-based (ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting. Certificateless cryptography can overcome the key escrow problem. In this paper, we present a general security model for certificateless proxy signature scheme. Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto K. Proxy signatures: Delegation of the power to sign messages [J]. IEICE Trans. Fundamentals, 1996, E79-A(9): 1338–1353.
Shamir A. Identity-based cryptosystems and Signature Schemes [C]//In CRYPTO, LNCS 1984. Heidelberg: Springer-Verlag, 1985: 47–53.
Al-Riyami S, Paterson K. Certificateless public key cryptography [C]//In ASIACRYPT, LNCS 2003. Heidelberg: Springer-Verlag, 2003: 452–473.
Hu B, Wong D, Zhang Z, et al. Key replacement attack against a generic construction of certificateless signature [C]//In ACISP, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 235–246.
Huang X, Susilo W, Mu Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003 [C]//In CANS, LNCS 2005. Heidelberg: Springer-Verlag, 2005: 13–25.
Yap W, Heng S, Goi B. An efficient certificateless signature scheme [C]//In EUC, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 322–331.
Yum D, Lee P. Generic construction of certificateless signature [C]//In ACISP, LNCS 2004. Heidelberg: Springer-Verlag, 2004: 200–211.
Zhang Z, Wong D, Xu J, et al. Certificateless publickey signature: Security model and efficient construction [C]// In: ACNS, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 293–308.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036, 90704004)
Rights and permissions
About this article
Cite this article
Wan, Zm., Lai, Xj., Weng, J. et al. On constructing certificateless proxy signature from certificateless signature. J. Shanghai Jiaotong Univ. (Sci.) 13, 692–694 (2008). https://doi.org/10.1007/s12204-008-0692-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-008-0692-5