UM
Residential Collegefalse
Status已發表Published
Identity-based group proxy signature scheme in the standard model
Gu K.3; Jia W.2; Li C.1; Chen R.1
2013-07-01
Source PublicationJisuanji Yanjiu yu Fazhan/Computer Research and Development
ISSN10001239
Volume50Issue:7Pages:1370-1386
AbstractCurrent group proxy signature schemes are not proved for their security in the complete security model for group proxy signature, and do not involve the concept of identity. In this paper, we show a complete security model for group proxy signature based on Boldyreva's security model. And a new identity-based group proxy signature scheme is proposed in the standard model based on the Paterson's scheme. In our security model for group proxy signature, the new scheme is proved to have the existential identity-based group proxy signature unforgerability under an adaptive chosen message attack, and have a security reduction to CDH problem. Compared with other group proxy signature schemes based on public key cryptosystem in the standard model, the new scheme is more secure and involves the concept of identity.
KeywordCDH problem Group proxy signature Identity Provable security Security model
URLView the original
Language英語English
Fulltext Access
Document TypeJournal article
CollectionUniversity of Macau
Affiliation1.Hunan University of Commerce
2.City University of Hong Kong
3.Central South University China
4.Changsha University of Science and Technology
Recommended Citation
GB/T 7714
Gu K.,Jia W.,Li C.,et al. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
APA Gu K.., Jia W.., Li C.., & Chen R. (2013). Identity-based group proxy signature scheme in the standard model. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 50(7), 1370-1386.
MLA Gu K.,et al."Identity-based group proxy signature scheme in the standard model".Jisuanji Yanjiu yu Fazhan/Computer Research and Development 50.7(2013):1370-1386.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Gu K.]'s Articles
[Jia W.]'s Articles
[Li C.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Gu K.]'s Articles
[Jia W.]'s Articles
[Li C.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Gu K.]'s Articles
[Jia W.]'s Articles
[Li C.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.