scholarly journals Certificateless Proxy Signature from RSA

2014 ◽  
Vol 2014 ◽  
pp. 1-10
Author(s):  
Lunzhi Deng ◽  
Jiwen Zeng ◽  
Yunyun Qu

Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient cryptosystems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme from RSA and prove its security under the strongest security model where the Type I/II adversary is a super Type I/II adversary.

2016 ◽  
Vol 27 (01) ◽  
pp. 85-100 ◽  
Author(s):  
Lunzhi Deng ◽  
Jiwen Zeng ◽  
Huawei Huang

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design cryptosystem with less pairing operations. Taken into account the computational costs, our scheme only requires 2 pairing operations in delegation and signing, respectively.


2013 ◽  
Vol 2013 ◽  
pp. 1-4 ◽  
Author(s):  
Wenbo Shi ◽  
Debiao He ◽  
Peng Gong

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. It has lots of practical applications in distributed systems, grid computing, mobile agent applications, distributed shared object systems, global distribution networks, and mobile communications. Recently, Padhye et al. proposed a certificateless proxy signature scheme with message recovery and claimed the scheme is secure against both of the two types of adversaries. However, in this paper, we will show that Padhye et al.’s scheme is not secure against the Type I adversary. The analysis shows their scheme is not secure for practical applications.


2020 ◽  
Vol 35 (24) ◽  
pp. 2050197
Author(s):  
Xiangjun Xin ◽  
Qinglan Yang ◽  
Fagen Li

A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation, a new quantum proxy signature scheme is proposed. The security of our quantum proxy signature scheme can be formally proved under security model. The security model of the quantum proxy signatures is helpful for analyzing and improving the security of the quantum proxy signature schemes. On the other hand, compared with the other quantum proxy signatures, the new one proposed in this paper is the first that can be formally proved to be secure under security model.


Sign in / Sign up

Export Citation Format

Share Document