Some New Proxy Signature Schemes from Pairings

Author(s):  
Fangguo Zhang ◽  
Reihaneh Safavi-Naini ◽  
Chin-Yin Lin
2010 ◽  
Vol 25 (1) ◽  
pp. 57-115 ◽  
Author(s):  
Alexandra Boldyreva ◽  
Adriana Palacio ◽  
Bogdan Warinschi

2011 ◽  
Vol 204-210 ◽  
pp. 1062-1065 ◽  
Author(s):  
Yu Qiao Deng

Digital signature schemes allow a signer to transform any message into a signed message, such that anyone can verify the validity of the signed message using the signer’s public key, but only the signer can generate signed messages. A proxy re-signature, which is a type of digital signatures, has significant applications in many areas. Proxy signature scheme was first introduced by Blaze, Bleumer, and Strauss, but that scheme is inefficient and with limited features. After that, some Proxy re-signature schemes were proposed by researchers. This paper constructs a blind proxy re-signatures scheme. Comparing to the previous proxy re-signature schemes, the scheme adds a message blinded feature, and then the security of the scheme is proven.


2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Weiwei Liu ◽  
Yi Mu ◽  
Guomin Yang ◽  
Yangguang Tian

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.


Sign in / Sign up

Export Citation Format

Share Document