Abstract: In an identity based proxy signature (IBPS) scheme, a
designated proxy signer can generate the signature on behalf of an original
signer. Traditional IBPS schemes normally rely on the assumption that
private keys are kept perfectly secure. However, due to viruses, worms or
other break-ins allowed by operating-system holes, key exposure seems
inevitable. To minimize the damage caused by key exposure in IBPS, we
propose an identity-based key-insulated proxy signature (IBKIPS) scheme in
the standard model, i.e. without random oracles.
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非), WANG Yong-tao (王永涛)
. Identity-Based Key-Insulated Proxy Signature Without Random Oracles[J]. Journal of Shanghai Jiaotong University(Science), 2011
, 16(5)
: 557
-566
.
DOI: 10.1007/s12204-011-1187-3
1 Shamir. Identity-based cryptosystems and signature schemes [C]// Proceedings of Advances in Cryptology-CRYPTO'84: LNCS 0193. Berlin: Springer-Verlag, 1984: 47-53.
2 Boneh D, Franklin M. Identity based encryption from the Weil pairing [C]// Proceedings of Advances in Cryptology-CRYPTO'01: LNCS 2139. Berlin: Springer-Verlag, 2001: 213-229.
3 Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages [J]. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science, 1996, E79-A(9): 1338-1354.
4 Cao Feng. Research on delegation based digital signature [D]. Shanghai: School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University, 2008 (in Chinese).
5 Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: LNCS 2567. Berlin: Springer-Verlag, 2003: 130-144.
6 Weng J, Chen K, Liu S. Identity-based strong key-insulated signature without random oracles [J]. Journal of Software, 2008, 19(6): 1555-1564.
7 Wan Z, Lai X, Weng J, et al. Identity-based key-insulated proxy signature [J]. Journal of Electronics (China), 2009, 26(6): 853-858.
8 Paterson K, Schuldt M. Identity-based signatures secure in the standard model [C]// Proceedings of the 11th Australasian Conference on Information Security and Privacy: LNCS 4058. Berlin: Springer-Verlag, 2006: 207-222.