Abstract
In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of forward secure certificateless proxy signature. Furthermore, we present a construction of forward secure certificateless proxy signature scheme with bilinear maps. Based on the difficulty of computational Diffie-Hellman problem, we prove the scheme is secure against chosen message attack in the random oracle model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Transactions on Fundamentals E79-A(9), 1338–1353 (1996)
Huang, X.Y., Mu, Y., Sulilo, W., Zhang, F.T.: Short Designed Verifier Proxy Signature from Pairings. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol. 3823, pp. 835–844. Springer, Heidelberg (2005)
Zhang, F.G., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Wang, H., Pieprzyk, J.: Efficient One-Time Proxy Signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507–522. Springer, Heidelberg (2003)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Yap, W., Heng, S., Goi, B.: Cryptanalysis of Some Proxy Signature Schemes without Certificates. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 115–126. Springer, Heidelberg (2007)
Chen, H., Zhang, F.T., Song, R.S.: Certificateless Proxy Signature with Provable Security. Journal of Software 20(3), 692–701 (2009)
Xiong, H., Li, F.G., Qin, Z.G.: A Provably Secure Proxy Signature Scheme in Certificateless Cryptography. International Journal of Informatica 21(2), 277–294 (2010)
Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy Signatures Secure against Proxy Key Exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008)
Anderson, R.: Two Remarks on Public Key Cryptology. Invited lecture. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (1997)
Bellare, M., Miner, S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)
Itkis, G., Reyzin, L.: Forward-Secure Signatures with Optimal Signing and Verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)
Kang, B.G., Park, J.H., Hahn, S.G.: A New Forward Secure Signature Scheme (2004), http://eprint.iacr.org/2004/183/
Nakanishi, T., Hira, Y., Funabiki, N.: Forward-Secure Group Signatures from Pairings. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 171–186. Springer, Heidelberg (2009)
Malkin, T., Micciancio, D., Miner, S.: Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 400–417. Springer, Heidelberg (2002)
Alomair, B., Sampigethaya, K., Poovendran, R.: Efficient Generic Forward-Secure Signatures and Proxy Signatures. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 166–181. Springer, Heidelberg (2008)
Yu, J., Kong, F.Y., Cheng, X.G., Hao, R., Li, G.W.: Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 83–97. Springer, Heidelberg (2008)
Chen, H.B., Yang, X.Y., Liang, Z.Y., Wu, X.G.: Forward Secure Certificateless Proxy Signature Scheme. Computer Engineering 36(2), 156–157 (2010)
Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless Signature Revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007)
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13(3), 361–396 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, J., Li, Y., Zhang, Y. (2013). Forward Secure Certificateless Proxy Signature Scheme. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)