Journal of South China University of Technology (Natural Science Edition) ›› 2009, Vol. 37 ›› Issue (5): 118-122,129.

• Computer Science & Technology • Previous Articles     Next Articles

Identity-Based Proxy Signature Scheme Secure in Standard Model

Li Ming-xiang1  Han Bo-tao1  Zhu Jian-yong2  Zheng Xue-fen1  Yan Peng2   

  1. 1. School of Information Engineering, University of Science and Technology Beijing, Beijing 100083, China; 2. State Information Center, Beijing 100045, China
  • Received:2008-05-27 Revised:2008-09-16 Online:2009-05-25 Published:2009-05-25
  • Contact: 李明祥(1968-),男,博士生,主要从事密码学与信息安全研究. E-mail:limingxiang2008@gmail.com
  • About author:李明祥(1968-),男,博士生,主要从事密码学与信息安全研究.
  • Supported by:

    国家“863”计划项目(2006AA012455);国家自然科学基金资助项目(60673160)

Abstract:

The existing identity-based proxy signature schemes are secure in the random oracle model but not al- ways secure in the real world. In order to solve this problem, a security model of identity-based proxy signature schemes is presented, and a new identity-based proxy signature scheme is proposed. The security of the proposed scheme is then proved based on the computational Diffie-Hellman assumption without using the random oracle heu- ristic in the presented security model. The results indicate that, as compared with the efficient identity-based proxy signature scheme recently presented, the proposed scheme only needs an additional bilinear mapping.

Key words: signature, proxy, random oracle model, bilinear mapping, computational Diffie-Hellman assumption