Proceedings of 2nd International Conference on Information Technology and Electronic Commerce 2014
DOI: 10.1109/icitec.2014.7105602
|View full text |Cite
|
Sign up to set email alerts
|

A highly efficient and identity-based proxy signature scheme without random oracle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The main phases are system initialization, Road Side Units (RSUs) initialization, vehicle initialization, vehicle pseudonymous credential updating, identity revocation, and message signatures and verification. In [48] an ID-based proxy signature method that is based on bilinear mapping and q-strong Diffie-Hellman (DH) problem is proposed. It has three roles, the PKG, the proxy signer, and the original signer.…”
Section: Summary Of Ibs Authentication Schemesmentioning
confidence: 99%
“…The main phases are system initialization, Road Side Units (RSUs) initialization, vehicle initialization, vehicle pseudonymous credential updating, identity revocation, and message signatures and verification. In [48] an ID-based proxy signature method that is based on bilinear mapping and q-strong Diffie-Hellman (DH) problem is proposed. It has three roles, the PKG, the proxy signer, and the original signer.…”
Section: Summary Of Ibs Authentication Schemesmentioning
confidence: 99%
“…In 2013, Kim et al [23] and Swapna et al [24] constructed the provably secure ID-based proxy signature schemes based on the lattice International Journal of Distributed Sensor Networks 3 problems, respectively and independently, but these schemes increased the length of the proxy private key significantly. In 2014, Hu et al [25] presented a novel ID-based proxy signature scheme, and the proposed scheme is provably secure in the standard model. In the same year, Cao et al [26] also presented a weak blind signature scheme by combing the requirements for proxy signature and weak blind signature.…”
Section: Related Workmentioning
confidence: 99%