Skip to main content
Log in

On constructing certificateless proxy signature from certificateless signature

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B. Recently many identity-based (ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting. Certificateless cryptography can overcome the key escrow problem. In this paper, we present a general security model for certificateless proxy signature scheme. Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto K. Proxy signatures: Delegation of the power to sign messages [J]. IEICE Trans. Fundamentals, 1996, E79-A(9): 1338–1353.

    Google Scholar 

  2. Shamir A. Identity-based cryptosystems and Signature Schemes [C]//In CRYPTO, LNCS 1984. Heidelberg: Springer-Verlag, 1985: 47–53.

    Google Scholar 

  3. Al-Riyami S, Paterson K. Certificateless public key cryptography [C]//In ASIACRYPT, LNCS 2003. Heidelberg: Springer-Verlag, 2003: 452–473.

    Google Scholar 

  4. Hu B, Wong D, Zhang Z, et al. Key replacement attack against a generic construction of certificateless signature [C]//In ACISP, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 235–246.

    Google Scholar 

  5. Huang X, Susilo W, Mu Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003 [C]//In CANS, LNCS 2005. Heidelberg: Springer-Verlag, 2005: 13–25.

    Google Scholar 

  6. Yap W, Heng S, Goi B. An efficient certificateless signature scheme [C]//In EUC, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 322–331.

    Google Scholar 

  7. Yum D, Lee P. Generic construction of certificateless signature [C]//In ACISP, LNCS 2004. Heidelberg: Springer-Verlag, 2004: 200–211.

    Google Scholar 

  8. Zhang Z, Wong D, Xu J, et al. Certificateless publickey signature: Security model and efficient construction [C]// In: ACNS, LNCS 2006. Heidelberg: Springer-Verlag, 2006: 293–308.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhong-mei Wan  (万中美).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036, 90704004)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wan, Zm., Lai, Xj., Weng, J. et al. On constructing certificateless proxy signature from certificateless signature. J. Shanghai Jiaotong Univ. (Sci.) 13, 692–694 (2008). https://doi.org/10.1007/s12204-008-0692-5

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0692-5

Key words

CLC number

Navigation