Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A New Generic Construction of Proxy Signatures under Enhanced Security Models

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Kee Sung-
dc.contributor.authorJeong, Ik Rae-
dc.date.accessioned2021-09-04T17:45:41Z-
dc.date.available2021-09-04T17:45:41Z-
dc.date.created2021-06-18-
dc.date.issued2015-04-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/93991-
dc.description.abstractA proxy signature scheme allows an entity to delegate his signing capabilities to another. Many schemes have been provided for use in numerous applications such as distributed computing, grid computing, and mobile communications. In 2003, Boldyreva et al. introduced the first formal security model of proxy signatures and also proposed a generic construction secure in their model. However, an adversary can arbitrarily alter the warrants of the proxy signatures because the warrants are not explicitly considered in their model. To solve this problem, Huang et al. provided an enhanced security model of proxy signatures in 2005. Some proxy signatures secure in this security model have been proposed but there is no generic construction yet. In this paper, we redefine and improve the Huang et al.'s security model in terms of multi-user and then provide a new generic construction of proxy signatures secure against our enhanced security model based on ID-based signatures. Moreover, we can make a lattice-based proxy signature scheme in the standard model from our result.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectIDENTITY-BASED SIGNATURES-
dc.subjectTRAPDOORS-
dc.subjectLATTICES-
dc.subjectSCHEME-
dc.titleA New Generic Construction of Proxy Signatures under Enhanced Security Models-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.identifier.doi10.1587/transfun.E98.A.975-
dc.identifier.scopusid2-s2.0-84926468588-
dc.identifier.wosid000359466100005-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E98A, no.4, pp.975 - 981-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE98A-
dc.citation.number4-
dc.citation.startPage975-
dc.citation.endPage981-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusIDENTITY-BASED SIGNATURES-
dc.subject.keywordPlusTRAPDOORS-
dc.subject.keywordPlusLATTICES-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordAuthorproxy signature-
dc.subject.keywordAuthorgeneric construction-
dc.subject.keywordAuthorID-based signature-
dc.subject.keywordAuthorlattice-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE