Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 373690, 10 pages
http://dx.doi.org/10.1155/2014/373690
Research Article

Certificateless Proxy Signature from RSA

1School of Mathematics and Computer Science, Guizhou Normal University, Guiyang 550001, China
2School of Mathematical Sciences, Xiamen University, Fujian 361005, China

Received 31 January 2014; Revised 28 May 2014; Accepted 29 May 2014; Published 23 June 2014

Academic Editor: Kwok-Wo Wong

Copyright © 2014 Lunzhi Deng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Shamir, “Identity-based cryptosystem and signature scheme,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, Springer, Berlin, Germany, 1985. View at Publisher · View at Google Scholar
  2. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology—Asiacrypt 2003, C. S. Laih, Ed., vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, Berlin, Germany, 2003. View at Google Scholar
  3. H. Du and Q. Wen, “Efficient and provably-secure certificateless short signature scheme from bilinear pairings,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 390–394, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Duan, “Certificateless undeniable signature scheme,” Information Sciences, vol. 178, no. 3, pp. 742–755, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Key replacement attack against a generic construction of certificateless signature,” in Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP '06), vol. 4058 of Lecture Notes in Computer Science, pp. 235–246, Springer, Melbourne, Australia, July 2006.
  6. X. Huang, W. Susilo, Y. Mu, and F. Zhang, “On the security of certificateless signature schemes from Asiacrypt 2003,” in Proceedings of the 4th International Conference on Cryptology and Network Security (CANS '05), vol. 3810 of Lecture Notes in Computer Science, pp. 13–25, Springer, Xiamen, China, December 2005. View at Publisher · View at Google Scholar
  7. Y. Long and K. Chen, “Certificateless threshold cryptosystem secure against chosen-ciphertext attack,” Information Sciences, vol. 177, no. 24, pp. 5620–5637, 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. K. A. Shim, “Breaking the short certificateless signature scheme,” Information Sciences, vol. 179, no. 3, pp. 303–306, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. F. Wang and Y. Zhang, “A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography,” Computer Communications, vol. 31, no. 10, pp. 2142–2149, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Wang, Z. Cao, X. Lia, and H. Qian, “Simulatability and security of certificateless threshold signatures,” Information Sciences, vol. 177, no. 6, pp. 1382–1394, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Zhang, D. S. Wong, J. Xu, and D. Feng, “Certificateless public-key signature: security model and efficient construction,” in Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS '06), vol. 3989 of Lecture Notes in Computer Science, pp. 293–308, Springer, Singapore, June 2006. View at Publisher · View at Google Scholar
  12. M. H. Au, J. Chen, J. K. Liu, Y. Mu, D. S. Wong, and G. Yang, “Malicious KGC attacks in certificateless cryptography,” in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS '07), pp. 302–311, Singapore, March 2007. View at Scopus
  13. L. C. Guillou and J. J. Quisquater, “A paradoxical identity-based signature scheme resulting from zero-knowledge,” in Advances in Cryptology—CRYPTO' 88, vol. 403 of Lecture Notes in Computer Science, pp. 216–231, Springer, New York, NY, USA, 1990. View at Publisher · View at Google Scholar
  14. J. Herranz, “Identity-based ring signatures from RSA,” Theoretical Computer Science, vol. 389, no. 1-2, pp. 100–117, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 79, no. 9, pp. 1338–1353, 1996. View at Google Scholar · View at Scopus
  17. A. Boldyreva, A. Palacio, and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights,” Journal of Cryptology, vol. 25, no. 1, pp. 57–115, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Gu and Y. Zhu, “Provable security of ID-based proxy signature schemes,” in Proceedings of the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC '05), X. Lu and W. Zhao, Eds., vol. 3619 of Lecture Notes in Computer Science, pp. 1277–1286, Springer, Zhangjiajie, China, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Gu and Y. Zhu, “An efficient ID-based proxy signature scheme from pairings,” in Proceedings of the 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT '07), vol. 4990 of Lecture Notes in Computer Science, pp. 40–50, Springler, Xining, China, September 2007. View at Publisher · View at Google Scholar
  20. D. B. He, J. H. Chen, and J. Hu, “An ID-based proxy signature schemes without bilinear pairings,” Annales des Télécommunications, vol. 66, no. 11-12, pp. 657–662, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Ji, W. Han, L. Zhao, and Y. Wang, “An identity-based proxy signature from bilinear pairings,” in Proceedings of the WASE International Conference on Information Engineering (ICIE '09), pp. 14–17, Shanxi, China, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. S. Kim, S. Park, and D. Won, “Proxy signatures, revisited,” in Proceedings of the 1st International Conference on Information and Communication Security (ICICS '97), Y. Han and S. Quing, Eds., vol. 1334 of Lecture Notes in Computer Science, pp. 223–232, Springer, Heidelberg, Germany, 1997. View at Google Scholar
  23. B. Lee, H. Kim, and K. Kim, “Strong proxy signature and its applications,” in Proceedings of the Symposium on Cryptography and Information Security (SCIS '01), pp. 603–608, Oiso, Japan, January 2001.
  24. B. Lee, H. Kim, and K. Kim, “Secure mobile agent using strong non designated proxy signature,” in Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP '01), V. Varadharajan and Y. Mu, Eds., vol. 2119 of Lecture Notes in Computer Science, pp. 474–486, Springer, Sydney, Australia, July 2001.
  25. J. Y. Lee, J. H. Cheon, and M. Kim SJoye, “An analysis of proxy signatures: is a secure channel necessary?” in Proceedings of the RSA Conference on the Cryptographers' Track (CT-RSA '03), vol. 2612 of Lecture Notes in Computer Science, pp. 68–79, Springer, San Francisco, Calif, USA, April 2003. View at Publisher · View at Google Scholar
  26. T. Malkin, S. Obana, and M. Yung, “The hierarchy of key evolving signatures and a characterization of proxy signatures,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), C. Cachin and J. L. Camenisch, Eds., vol. 3027 of Lecture Notes in Computer Science, pp. 306–322, Springer, Interlaken, Switzerland, May 2004. View at Publisher · View at Google Scholar
  27. T. Okamoto, A. Inomata, and E. Okamoto, “A proposal of short proxy signature using pairing,” in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC '05), pp. 631–635, IEEE Computer Society Press, Los Alamitos, Calif, USA, April 2005. View at Scopus
  28. T. Okamoto, M. Tada, and E. Okamoto, “Extended proxy signatures for smart cards,” in Proceedings of the 2nd International Workshop on Information Security (ISW '99), Y. Zheng and M. Mambo, Eds., vol. 1729 of Lecture Notes in Computer Science, pp. 247–258, Springer, Kuala Lumpur, Malaysia, November 1999. View at Publisher · View at Google Scholar
  29. G. Wang, F. Bao, J. Zhou, and R. H. Deng, “Security analysis of some proxy signatures,” in Proceedings of the 6th International Conference on Information Security and Cryptology (ICISC '03), J.-I. Lim and D.-H. Lee, Eds., vol. 2971 of Lecture Notes in Computer Science, pp. 305–319, Springer, Seoul, Republic of Korea, November 2004. View at Publisher · View at Google Scholar
  30. W. Wu, Y. Mu, W. Susilo, J. Seberry, and X. Y. Huang, “Identity-based proxy signature from pairings,” in Proceedings of the 4th International Conference on Autonomic and Trusted Computing (ATC '07), vol. 4610 of Lecture Notes in Computer Science, pp. 22–31, Springer, Hong Kong, July 2007. View at Publisher · View at Google Scholar
  31. J. Xu, Z. Zhang, and D. Feng, “ID-based proxy signature using bilinear pairings,” in Parallel and Distributed Processing and Applications—ISPA 2005 Workshops, G. Chen, Y. Pan, M. Guo, and J. Lu, Eds., vol. 3759 of Lecture Notes in Computer Science, pp. 359–367, Springer, Heidelberg, Germany, 2005. View at Publisher · View at Google Scholar
  32. K. Choi and D. Lee, “Certificateless proxy signature scheme,” in Proceedings of the 3rd International Conference on Multimedia, Information Technology and Its Applications (MITA '07), pp. 437–440, Manila, Philippines, August 2007.
  33. Y. C. Chen, C. L. Liu, G. Horng, and K. C. Chen, “A provably secure certificateless proxy signature scheme,” International Journal of Innovative Computing, Information & Control, vol. 7, no. 9, pp. 5557–5569, 2011. View at Google Scholar · View at Scopus
  34. R. Lu, D. He, and C. Wang, “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings,” in Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD '07), pp. 285–290, IEEE Computer Society, Qingdao, China, August 2007. View at Publisher · View at Google Scholar
  35. X. Li, K. Chen, and L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings,” Lithuanian Mathematical Journal, vol. 45, no. 1, pp. 76–83, 2005. View at Publisher · View at Google Scholar · View at Scopus
  36. S. H. Seo, K. Y. Choi, J. Y. Hwang, and S. Kim, “Efficient certificateless proxy signature scheme with provable security,” Information Sciences, vol. 188, pp. 322–337, 2012. View at Publisher · View at Google Scholar · View at Scopus
  37. H. Xiong, F. G. Li, and Z. G. Qin, “A provably secure proxy signature scheme in certificateless cryptography,” Informatica, vol. 21, no. 2, pp. 277–294, 2010. View at Google Scholar · View at Scopus
  38. L. Zhang, F. T. Zhang, and Q. H. Wu, “Delegation of signing rights using certificateless proxy signatures,” Information Sciences, vol. 184, no. 1, pp. 298–309, 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. X. Cao, W. Kou, and X. Du, “A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges,” Information Sciences, vol. 180, no. 15, pp. 2895–2903, 2010. View at Publisher · View at Google Scholar · View at Scopus