2014
DOI: 10.1002/dac.2820
|View full text |Cite
|
Sign up to set email alerts
|

A short ID‐based proxy signature scheme

Abstract: Abstract. The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead since signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: Singh and Verma's scheme and Yoon et al.'s scheme. Unfortunately, Tian et al. by presenting two forgery attacks show that Singh and Verma's scheme is not secure, and also Yoon et al.'s scheme does not support prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 52 publications
0
14
0
Order By: Relevance
“…To compute the costs in miliseconds (ms), we follow the work of Tsai, where the cost of modular multiplication is M =0.1 ms. Thus, from Table the total computation costs of schemes in are 4 e +5 S m +3 H ≈58.0 ms, 4 e +5 S m +5 H ≈60.9 ms, 7 e +7 S m +7 H ≈101.5 ms, 5 e +5 S m +5 H ≈72.5 ms, 4 e +6 S m +1 E ≈76.2 ms and 7 e +3 S m +4 E ≈165.6 ms, respectively. While our scheme consumes 4 e +3 S m +3 H +1 I n v ≈53.36 ms and thus, from Figure , it is obvious that our proposal is more efficient than schemes in the works of Asaar et al, Kang et al, Li et al, Seo et al, Hu et al, and Islam and Biswas …”
Section: Analysis Of the Proposed Scb‐ps Schemementioning
confidence: 98%
See 2 more Smart Citations
“…To compute the costs in miliseconds (ms), we follow the work of Tsai, where the cost of modular multiplication is M =0.1 ms. Thus, from Table the total computation costs of schemes in are 4 e +5 S m +3 H ≈58.0 ms, 4 e +5 S m +5 H ≈60.9 ms, 7 e +7 S m +7 H ≈101.5 ms, 5 e +5 S m +5 H ≈72.5 ms, 4 e +6 S m +1 E ≈76.2 ms and 7 e +3 S m +4 E ≈165.6 ms, respectively. While our scheme consumes 4 e +3 S m +3 H +1 I n v ≈53.36 ms and thus, from Figure , it is obvious that our proposal is more efficient than schemes in the works of Asaar et al, Kang et al, Li et al, Seo et al, Hu et al, and Islam and Biswas …”
Section: Analysis Of the Proposed Scb‐ps Schemementioning
confidence: 98%
“…From Table , it is clear that our scheme presents the shortest signature size 256 bits and resists both the key escrow and public key replacement attacks. However, the schemes by Asaar et al is message recovery PS scheme but with fixed size message. Thus, as far as arbitrary size message is considered our scheme is the shortest.…”
Section: Analysis Of the Proposed Scb‐ps Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Because the proxy key pair is produced by applying the original signer's signature on the delegation information, any verifier can verify the original signer's agreement from the proxy signature. Since the proposed EPS scheme has integrated the technique of proxy signature, we will introduce the proxy signature's techniques in the literature as follows. Generating Original Parameter Phase: Firstly, let p and q be 2 primes such that q ∣ p − 1.…”
Section: System Backgroundmentioning
confidence: 99%
“…This large bandwidth with good propagation characteristics and favorable path loss features can be developed much for unlicensed usage specified by standardization, while the major result is IEEE 802. 22 standard, 3 which can provide protections from harmful interference for PUs operating in TV broadcast bands. By the standard, the SUs need sensing the spectrum temporally and spatially to decide whether it is occupied by the PUs, and vacating the used spectrum once the PUs reclaim the spectrum.…”
Section: Introductionmentioning
confidence: 99%