{"title":"A New Construction of Proxy Signature Using Chameleon Hash Function","authors":"Yannan Li, Qi Xia, Jianbing Ni, Yong Yu","doi":"10.1109/INCoS.2013.73","DOIUrl":null,"url":null,"abstract":"Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrates that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.73","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to generate a valid proxy signature, which dramatically reduces the computation cost of the proxy signer. Our analysis demonstrates that the new scheme achieves all the desirable properties that a secure proxy signature scheme should provide.