Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient certificateless proxy signature scheme with provable security

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Seung-Hyun-
dc.contributor.authorChoi, Kyu Young-
dc.contributor.authorHwang, Jung Yeon-
dc.contributor.authorKim, Seungjoo-
dc.date.accessioned2021-09-06T21:32:28Z-
dc.date.available2021-09-06T21:32:28Z-
dc.date.created2021-06-18-
dc.date.issued2012-04-01-
dc.identifier.issn0020-0255-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/108759-
dc.description.abstractIn this paper we propose a very efficient and provably secure proxy signature scheme with implicit certificate (called "certificateless proxy signature scheme"), where a receiver does not have to verify a certificate before verifying a signed message, yet only the original signer or the proxy signer who properly registered its public key and identity information is able to sign. Unlike traditional approaches which assume a PKI where the original signer and the proxy signer already hold their public keys and digital certificates, our scheme does not need for each user to have a public key and a certificate, thus we can save the time for verifying the original signer's and the proxy signer's certificates in the proxy signature verification phase. Furthermore, we present a formal security model for our scheme under the intractability of the computational Diffie-Hellman problem in the random oracle model. (C) 2011 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectBILINEAR PAIRINGS-
dc.subjectCRYPTOGRAPHY-
dc.subjectCONSTRUCTION-
dc.subjectDELEGATION-
dc.titleEfficient certificateless proxy signature scheme with provable security-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo, Seung-Hyun-
dc.contributor.affiliatedAuthorKim, Seungjoo-
dc.identifier.doi10.1016/j.ins.2011.11.005-
dc.identifier.scopusid2-s2.0-84855431560-
dc.identifier.wosid000300201700020-
dc.identifier.bibliographicCitationINFORMATION SCIENCES, v.188, pp.322 - 337-
dc.relation.isPartOfINFORMATION SCIENCES-
dc.citation.titleINFORMATION SCIENCES-
dc.citation.volume188-
dc.citation.startPage322-
dc.citation.endPage337-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusBILINEAR PAIRINGS-
dc.subject.keywordPlusCRYPTOGRAPHY-
dc.subject.keywordPlusCONSTRUCTION-
dc.subject.keywordPlusDELEGATION-
dc.subject.keywordAuthorProxy signature-
dc.subject.keywordAuthorCertificateless signature-
dc.subject.keywordAuthorCertificateless proxy signature-
dc.subject.keywordAuthorDelegation-
dc.subject.keywordAuthorProvable security-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Mathematics > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE