2017
DOI: 10.1002/ett.3214
|View full text |Cite
|
Sign up to set email alerts
|

Short certificate‐based proxy signature scheme from pairings

Abstract: Recently, the delegation of signing capacity has become a common practice to develop applications like distributed computing, grid computing, mobile agents, mobile communication, etc. The method of proxy signing, introduced by Mambo et al, is the tool of such delegation. In 2003, Gentry introduced the paradigm of certificate‐based encryption to remove the key escrow problem in identity‐based public key cryptography (PKC) and to combine the merits of PKC and identity‐based PKC. This article presents an efficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…In 2016, Zhou and Cui introduced a CBS [28] scheme secure against the maliciousbut-passive certifier attack. In 2017, Verma et al proposed a short CBS scheme to deploy on WSNs [29]. Their scheme is the shortest pairing based construction.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2016, Zhou and Cui introduced a CBS [28] scheme secure against the maliciousbut-passive certifier attack. In 2017, Verma et al proposed a short CBS scheme to deploy on WSNs [29]. Their scheme is the shortest pairing based construction.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the proposed PFCBAS scheme is secure (EUF-ACMA) in ROM if both of the schemes are EUF-ACMA. Based on capabilities, two different forgers F 1 (Type-1) and F 2 (Type-2) are considered and following are the detailed definitions of forgers F 1 , F 2 and the oracles executed by them [26], [30], [29].…”
Section: Threat Modelmentioning
confidence: 99%