Skip to main content

New ID-Based Proxy Signature Scheme with Message Recovery

  • Conference paper
Grid and Pervasive Computing (GPC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7861))

Included in the following conference series:

Abstract

In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper proposes an improvement of Singh-Verma’s scheme to eliminate the security problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy signature for delegating signing operation. In: Proc. 3rd ACM Conference on CCS, pp. 48–57 (1996)

    Google Scholar 

  2. Zhang, F., Susilo, W., Mu, Y.: Identity-based partial message recovery signatures (or how to shorten ID-based signatures). In: Proc. 9th Conference on FC, pp. 45–56 (2005)

    Google Scholar 

  3. Tso, R., Gu, C., Okamoto, T., Okamoto, E.: Efficient ID-Based Digital Signatures with Message Recovery. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 47–59. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Singh, H., Verma, G.K.: ID-based proxy signature scheme with message recovery. Journal of Systems and Software 85, 209–214 (2012)

    Article  Google Scholar 

  5. Tian, M., Huang, L., Yang, W.: Cryptanalysis of an ID-based proxy signature scheme with message recovery. Applied Mathematics & Information Sciences 6(3), 47–59 (2012)

    MathSciNet  Google Scholar 

  6. Chou, J.: A Novel Anonymous Proxy Signature Scheme. Advances in Multimedia 427961, 1–10 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoon, EJ., Choi, Y., Kim, C. (2013). New ID-Based Proxy Signature Scheme with Message Recovery. In: Park, J.J.(.H., Arabnia, H.R., Kim, C., Shi, W., Gil, JM. (eds) Grid and Pervasive Computing. GPC 2013. Lecture Notes in Computer Science, vol 7861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38027-3_111

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38027-3_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38026-6

  • Online ISBN: 978-3-642-38027-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics