2013
DOI: 10.1002/dac.2683
|View full text |Cite
|
Sign up to set email alerts
|

Provable secure identity‐based multi‐proxy signature scheme

Abstract: SUMMARYMulti-proxy signature is one of the useful primitives of the proxy signature. Till now, only a few schemes of identity-based multi-proxy signature (IBMPS) have been proposed using bilinear pairings, but most of the schemes are insecure or lack a formal security proof. Because of the important application of IBMPS scheme in distributed systems, grid computing, and so on , construction of an efficient and provable-secure IBMPS scheme is desired. In 2005, Li & Chen proposed an IBMPS scheme from bilinear pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 43 publications
0
15
0
Order By: Relevance
“…This should cover different phases of authentication process like initial registration, registration for subscription as well as deregistration process. Another confidentiality consideration for encryption is the proper key management [13]. In the following section authors have proposed a security model to enhance cloud security.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…This should cover different phases of authentication process like initial registration, registration for subscription as well as deregistration process. Another confidentiality consideration for encryption is the proper key management [13]. In the following section authors have proposed a security model to enhance cloud security.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Let scriptG2 be a multiplicative cyclic group with the same order q . Let ê:scriptG1×scriptG1scriptG2 be a bilinear map, for all P,QscriptG1, and a,bscriptZq*, and the mapping satisfies the following: Bilinearity: ê(aP,Q)=ê(P,Q)a=ê(P,aQ), and ê(aP,bQ)=ê(P,Q)ab=ê(bP,aQ). Non‐degeneracy: P,QscriptG1subject to ê(P,Q)1, in other words, P0ê(P,P)1. Computability: it is efficient to compute ê(P,Q), P,QscriptG1. …”
Section: Hibass: Hierarchical Identity‐based Signature Schemementioning
confidence: 99%
“…In this paper, we propose a hierarchical identity‐based signature scheme (HIBaSS), specially for the downlink transmission of AMI. The idea of identity‐based cryptography motivated many encryption and signature schemes . The schemes are usually based on bilinear pairing, which can be applied efficiently because of the property of linearity in both components.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the notion of proxy signatures has been introduced, several variants of proxy signatures have been proposed. These include proxy signature schemes [9][10][11][12][13][14][15][16][17], identity-based proxy signature schemes based on the bilinear pairings [18][19][20][21][22][23][24][25], designated verifier signature schemes [26][27][28], (identity-based) multi-proxy signatures [23,[29][30][31][32][33], identity-based proxy multi-signatures [30,[34][35][36][37], (identity-based) multi-proxy multi-signature schemes [30,[38][39][40][41][42][43], identity-based proxy signatures with message recovery [44,45], a certificate-less proxy signature with message recovery and its security analysis [46,47] and analysis of proxy signatures [48][49][50]. In this study, we focus on identity-based proxy signature schemes with message recovery property to shorten i...…”
Section: Introductionmentioning
confidence: 99%