会议专题

ID-based designated -verifier proxy signature scheme without a trusted party

As existing designated-verifier proxy signatures need to trust a Private Key Generator(PKG) unconditionally. Dishonest PKG can compute the private key of any user and forge a proxy signature of any one. In order to settle the problem who PKG causes, an ID-based designated -verifier proxy signature scheme without trusted PKG is proposed. The security analysis shows that ID-based designated-verifier proxy signature scheme without trusted PKG is secure and effective, The scheme is able to resist the forgery attack from PKG.

proxy signature ID-based untrlisting PKG

Aimei Yang

School of Information Science and Engineering, Henan University of Technology, Zheng Zhou,450001

国际会议

The 2010 International Conference on Computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)

太原

英文

191-193

2010-10-22(万方平台首次上网日期,不代表论文的发表时间)