Publication | Closed Access
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.
72
Citations
5
References
2003
Year
Hardware SecurityCryptographic PrimitiveEngineeringDigital SignaturePost-quantum CryptographyAuthentication ProtocolIdentity-based SecurityBilinear PairingProxy SignatureProxy Blind SignatureProxy SignaturesNew Proxy SignatureProxy Signature SchemesCryptography
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this paper, we address that it is easy to design proxy signature and proxy blind signature from the conventional ID-based signature schemes using bilinear pairings, and give some concrete schemes based on existed ID-based signature schemes. At the same time, we introduce a new type of proxy signature – proxy ring signature, and propose the first proxy ring signature scheme based on an existed ID-based ring signature scheme.
| Year | Citations | |
|---|---|---|
Page 1
Page 1