• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.
Citation: Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.

Identity-Based Group Proxy Signature Scheme in the Standard Model

More Information
  • Published Date: July 14, 2013
  • Current group proxy signature schemes are not proved for their security in the complete security model for group proxy signature, and do not involve the concept of identity. In this paper, we show a complete security model for group proxy signature based on Boldyreva's security model. And a new identity-based group proxy signature scheme is proposed in the standard model based on the Paterson's scheme. In our security model for group proxy signature, the new scheme is proved to have the existential identity-based group proxy signature unforgerability under an adaptive chosen message attack, and have a security reduction to CDH problem. Compared with other group proxy signature schemes based on public key cryptosystem in the standard model, the new scheme is more secure and involves the concept of identity.
  • Related Articles

    [1]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [2]Tang Yongli, Li Yuanhong, Zhang Xiaohang, Ye Qing. Identity-Based Group Signatures Scheme on Lattice[J]. Journal of Computer Research and Development, 2022, 59(12): 2723-2734. DOI: 10.7544/issn1000-1239.20210930
    [3]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [4]Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219
    [5]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [6]Gu Ke, Jia Weijia, Jiang Chunlin. A Group Proxy Signature Scheme Based on Sub-Secret Evolution[J]. Journal of Computer Research and Development, 2012, 49(5): 962-973.
    [7]Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
    [8]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [9]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.
    [10]Hu Liang, Liu Zheli, Sun Tao, Liu Fang. Survey of Security on Identity-Based Cryptography[J]. Journal of Computer Research and Development, 2009, 46(9): 1537-1548.

Catalog

    Article views (637) PDF downloads (597) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return