Identity-based threshold signature and mediated proxy signature schemes

Author(s):  
Yong YU ◽  
Bo YANG ◽  
Ying SUN
2018 ◽  
Vol 2018 ◽  
pp. 1-11
Author(s):  
Weiwei Liu ◽  
Yi Mu ◽  
Guomin Yang ◽  
Yangguang Tian

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It has attracted a lot of attention since it was introduced. There have been lots of works in constructing efficient and secure proxy signature schemes. In this paper, we identify a new attack that has been neglected by many existing proven secure proxy signature schemes. We demonstrate this attack by launching it against an identity-based proxy signature scheme which is proven secure. We then propose one method that can effectively prevent this attack. The weakness in some other proxy signature schemes can also be fixed by applying the same method.


2013 ◽  
Vol 380-384 ◽  
pp. 2605-2608
Author(s):  
Jian Wu

Identity-based encryption and signature schemes that allow any pair of users to communicate securely and to verify each other's signatures without verifying certificate. A signcryption is a primitive that provides the properties of both digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately. Proxy signature schemes are a variation of ordinary digital signature scheme that allow a proxy signer to sign messages on behalf of the original singer which proxy signcryption simultaneously fulfill both the functions of signature and encryption in a single step with a lower computational cost than that required by the traditional signature-then-encryption. In this paper, we present identity-based proxy signcryption schemes with lower efficient..


2014 ◽  
Vol 58 (10) ◽  
pp. 2507-2508 ◽  
Author(s):  
Debiao He ◽  
Mingwu Zhang ◽  
Baowen Xu

2010 ◽  
Vol 25 (1) ◽  
pp. 57-115 ◽  
Author(s):  
Alexandra Boldyreva ◽  
Adriana Palacio ◽  
Bogdan Warinschi

Sign in / Sign up

Export Citation Format

Share Document