{"title":"具有撤销列表的可控代理签名方案","authors":"Jianhong Zhang, Wei Wang, Xue Liu","doi":"10.1109/ICASID.2010.5551485","DOIUrl":null,"url":null,"abstract":"Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"355 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A controllable proxy signature scheme with revocation list\",\"authors\":\"Jianhong Zhang, Wei Wang, Xue Liu\",\"doi\":\"10.1109/ICASID.2010.5551485\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.\",\"PeriodicalId\":391931,\"journal\":{\"name\":\"2010 International Conference on Anti-Counterfeiting, Security and Identification\",\"volume\":\"355 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Anti-Counterfeiting, Security and Identification\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2010.5551485\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Anti-Counterfeiting, Security and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2010.5551485","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A controllable proxy signature scheme with revocation list
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.