Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 761694, 4 pages
http://dx.doi.org/10.1155/2013/761694
Research Article

On the Security of a Certificateless Proxy Signature Scheme with Message Recovery

1Department of Electronic Engineering, Northeastern University at Qinhuangdao, Qinhuangdao 066004, China
2School of Mathematics and Statistics, Wuhan University, Wuhan, Hubei 430072, China
3National Key Laboratory of Mechatronic Engineering and Control, School of Mechatronical Engineering, Beijing Institute of Technology, Beijing 100081, China

Received 19 January 2013; Accepted 5 April 2013

Academic Editor: Wanquan Liu

Copyright © 2013 Wenbo Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E79-A, no. 9, pp. 1338–1354, 1996. View at Google Scholar · View at Scopus
  2. S. F. Tzeng and M. S. Hwang, “Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem,” Computer Standards and Interfaces, vol. 26, no. 2, pp. 61–71, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. M. S. Hwang, C. C. Lee, and S. F. Tzeng, “A new proxy signature scheme for a specified group,” Information Sciences, vol. 227, pp. 102–115, 2013. View at Google Scholar
  4. D. He, Y. Chen, J. Chen, R. Zhang, and W. Han, “A new two-round certificateless authenticated key agreement protocol without bilinear pairings,” Mathematical and Computer Modelling, vol. 54, no. 11-12, pp. 3143–3152, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  5. D. He, J. Chen, and J. Hu, “A pairing-free certificateless authenticated key agreement protocol,” International Journal of Communication Systems, vol. 25, no. 2, pp. 221–230, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. D. He, S. Padhye, and J. Chen, “An efficient certificateless two-party authenticated key agreement protocol,” Computers & Mathematics with Applications, vol. 64, no. 6, pp. 1914–1926, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  7. D. He, J. Chen, and R. Zhang, “An efficient and provably-secure certificateless signature scheme without bilinear pairings,” International Journal of Communication Systems, vol. 25, no. 11, pp. 1432–1442, 2012. View at Google Scholar
  8. D. He, Y. Chen, and J. Chen, “A provably secure certificateless proxy signature scheme without pairings,” Mathematical and Computer Modelling, vol. 57, no. 9-10, pp. 2510–2518, 2013. View at Google Scholar
  9. D. He, B. Huang, and J. Chen, “A new certificateless short signature scheme,” IET Information Security. In press.
  10. X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings,” Lithuanian Mathematical Journal, vol. 45, no. 1, pp. 76–83, 2005. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  11. W. Yap, S. Heng, and B. Goi, “Cryptanalysis of some proxy signature schemes without certificates,” in Proceedings of the 1st Workshop on Information Security Theory and Practices (WISTP '07), vol. 4462 of Lecture Notes in Computer Science, pp. 115–126, Springer, Heraklion, Greece, May 2007.
  12. R. Lu, D. He, and C. Wang, “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings,” in Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07), pp. 285–290, Qingdao, China, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. H. Chen, F.-T. Zhang, and R.-S. Song, “Certificateless proxy signature scheme with provable security,” Journal of Software, vol. 20, no. 3, pp. 692–701, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  14. H. Xiong, F. Li, and Z. Qin, “A provably secure proxy signature scheme in certificateless cryptography,” Informatica, vol. 21, no. 2, pp. 277–294, 2010. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  15. L. Zhang, F. Zhang, and Q. Wu, “Delegation of signing rights using certificateless proxy signatures,” Information Sciences, vol. 184, pp. 298–309, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. S. Seo, K. Choi, J. Hwang, and S. Kim, “Delegation of signing rights using certificateless proxy signatures,” Information Sciences, vol. 188, pp. 321–337, 2012. View at Google Scholar
  17. S. Padhye and N. Tiwari, “ECDLP-based certificateless proxy signature scheme with message recovery,” Transactions on Emerging Telecommunications Technologies, 2012. View at Publisher · View at Google Scholar