Residential College | false |
Status | 已發表Published |
Identity-based group proxy signature scheme in the standard model | |
Gu K.3; Jia W.2; Li C.1; Chen R.1 | |
2013-07-01 | |
Source Publication | Jisuanji Yanjiu yu Fazhan/Computer Research and Development |
ISSN | 10001239 |
Volume | 50Issue:7Pages:1370-1386 |
Abstract | Current group proxy signature schemes are not proved for their security in the complete security model for group proxy signature, and do not involve the concept of identity. In this paper, we show a complete security model for group proxy signature based on Boldyreva's security model. And a new identity-based group proxy signature scheme is proposed in the standard model based on the Paterson's scheme. In our security model for group proxy signature, the new scheme is proved to have the existential identity-based group proxy signature unforgerability under an adaptive chosen message attack, and have a security reduction to CDH problem. Compared with other group proxy signature schemes based on public key cryptosystem in the standard model, the new scheme is more secure and involves the concept of identity. |
Keyword | CDH problem Group proxy signature Identity Provable security Security model |
URL | View the original |
Language | 英語English |
Fulltext Access | |
Document Type | Journal article |
Collection | University of Macau |
Affiliation | 1.Hunan University of Commerce 2.City University of Hong Kong 3.Central South University China 4.Changsha University of Science and Technology |
Recommended Citation GB/T 7714 | Gu K.,Jia W.,Li C.,et al. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386. |
APA | Gu K.., Jia W.., Li C.., & Chen R. (2013). Identity-based group proxy signature scheme in the standard model. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 50(7), 1370-1386. |
MLA | Gu K.,et al."Identity-based group proxy signature scheme in the standard model".Jisuanji Yanjiu yu Fazhan/Computer Research and Development 50.7(2013):1370-1386. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment