Affiliation:
1. Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
2. College of Cyber Security/College of Information Science and Technology, Jinan University, Guangzhou 510632, China
Abstract
Abstract
In certificateless proxy signature (CLPS), the key generation center is responsible for initializing the system parameters and can obtain the opportunity to adaptively set some trapdoors in them when wanting to launch some attacks. Until now, how to withstand the malicious-but-passive key generation center (MKGC) attacks in CLPS is still an interesting problem. In this paper, we focus on the challenging issue and introduce a CLPS scheme provably secure in the standard model. To the best of our knowledge, we are the first to demonstrate its security under MKGC attacks by adopting the technology of embedding the classic difficulty problems into the target entity public key rather than the system parameters during the security proof process.
Funder
National Key R&D Plan of China
National Natural Science Foundation of China
Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence
Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve
Zhuhai Top Discipline Information Security
Guangzhou Key Laboratory of Data Security and Privacy Preserving
National Joint Engineering Research Center of Network Security Detection and Protection Technology
Publisher
Oxford University Press (OUP)
Reference35 articles.
1. Auditable $\sigma $-time outsourced attribute-based encryption for access control in cloud computing;Ning;IEEE Trans. Inf. Foren. Sec.,2017
2. Provably secure and lightweight certificateless signature scheme for iiot environments;Karati;IEEE Trans. Ind. Informat.,2018
3. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage;Yang;IEEE Trans. Cloud Comput.,2018
4. Proxy signature: Delegation of the power to sign messages;Mambo;IEICE Trans. Fundam. Electron. Commun. Comput. Sci.,1996
5. A digital nominative proxy signature scheme for mobile communication;Park,2001
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献