Journal of shanghai Jiaotong University (Science) ›› 2011, Vol. 16 ›› Issue (6): 663-671.doi: 10.1007/s12204-011-1208-2

• Articles • Previous Articles     Next Articles

Directed Proxy Signature in the Standard Model

Directed Proxy Signature in the Standard Model

 MING Yang (明   洋),    WANG Yu-min (王育民)   

  1. (1. School of Information Engineering, Chang'an University, Xi'an 710064, China;
    2. Shaanxi Road Traffic Detection and Equipment Engineering Research
    Center, Chang'an University, Xi'an 710064, China;
    3. State Key Laboratory of Integrated Service Network, Xidian
    University, Xi'an 710071, China) 
  2. (1. School of Information Engineering, Chang'an University, Xi'an 710064, China;
    2. Shaanxi Road Traffic Detection and Equipment Engineering Research
    Center, Chang'an University, Xi'an 710064, China;
    3. State Key Laboratory of Integrated Service Network, Xidian
    University, Xi'an 710071, China) 
  • Received:2010-11-15 Online:2011-12-30 Published:2012-01-12
  • Contact: MING Yang (明 洋) E-mail:yangming@chd.edu.cn

Abstract:  restricted verification ability.  Directed signatures
allow only a designated verifier to check the validity of the
signature issued to him, and at the time of trouble or if necessary,
any third party can verify the signature with the help of the signer
or the designated verifier. Directed signature schemes are widely
used in situations where the receiver's privacy should be protected.
Proxy signatures allow an entity to delegate its signing capability
to another entity in such a way that the latter can sign message on
behalf of the former when the former is not available. Proxy
signature schemes have found numerous practical applications such as
distributed systems and mobile agent applications. In this paper, we
firstly define the notion of the directed proxy signature by
combining the proxy signature and directed signature. Then, we
formalize its security model and present a concrete scheme in the
standard model. Finally, we use the techniques from provable
security to show that the proposed scheme is unforgeable under the
gap Diffie-Hellman assumption, and invisible under the decisional
Diffie-Hellman assumption.

Key words:

directed signature| proxy signature| bilinear
pairings| standard model

摘要:  restricted verification ability.  Directed signatures
allow only a designated verifier to check the validity of the
signature issued to him, and at the time of trouble or if necessary,
any third party can verify the signature with the help of the signer
or the designated verifier. Directed signature schemes are widely
used in situations where the receiver's privacy should be protected.
Proxy signatures allow an entity to delegate its signing capability
to another entity in such a way that the latter can sign message on
behalf of the former when the former is not available. Proxy
signature schemes have found numerous practical applications such as
distributed systems and mobile agent applications. In this paper, we
firstly define the notion of the directed proxy signature by
combining the proxy signature and directed signature. Then, we
formalize its security model and present a concrete scheme in the
standard model. Finally, we use the techniques from provable
security to show that the proposed scheme is unforgeable under the
gap Diffie-Hellman assumption, and invisible under the decisional
Diffie-Hellman assumption.

关键词:

directed signature| proxy signature| bilinear
pairings| standard model

CLC Number: