2012
DOI: 10.5755/j01.itc.41.1.830
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable Proxy Signature Scheme Based on Bilinear Pairings With Identity-Based Cryptographic Approaches

Abstract: Hu and Huang proposed an identity-based proxy signature scheme with bilinear pairings. By this approach, the extra burden of verifying a public key with a certificate can be eliminated, and the length of a digital signature can be 160 bits only. Later, Park et al. pointed out that Hu and Huang's scheme suffers from one serious problem, privacy problem, such that a proxy key is generated by using a designated proxy signer's private key without his agreement. To solve this problem, Park et al. also proposed an i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Packets experience large transmission delays when using ABS verification. To address these problems, AISCF extends and employs the ABS scheme proposed by Tang, Ling & Shan (2022) in the packet forwarding process through SDN. The scheme incurs low time overhead in the signature verification process and is independent of the number of attributes, enabling lightweight and fine-grained secure forwarding verification of data packets.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…Packets experience large transmission delays when using ABS verification. To address these problems, AISCF extends and employs the ABS scheme proposed by Tang, Ling & Shan (2022) in the packet forwarding process through SDN. The scheme incurs low time overhead in the signature verification process and is independent of the number of attributes, enabling lightweight and fine-grained secure forwarding verification of data packets.…”
Section: Problem Descriptionmentioning
confidence: 99%
“…Next, we define the proxy model for the proxy signature scheme. Derived from previous definitions related to the proxy signatures addressed in [19][20][21][22][23][24][25][26], we give the security model for the proxy signature scheme as follows. In this security model, the adversaries can be divided into three types.…”
Section: Security Analysesmentioning
confidence: 99%
“…In 2001, Boneh and Franklin [2] adopted Shamir's idea to propose a new ID-based public key system and the first practical ID-based encryption (IBE) based on modification of bilinear pairings defined on elliptic curves. Since then, a numerous primitives for IBC have been published such as ID-based authentication protocols [3][4][5], ID-based key agreement protocols [6][7][8], ID-based signature schemes [9][10][11][12][13] and ID-based encryption schemes [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%