کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
462044 | 696659 | 2012 | 6 صفحه PDF | دانلود رایگان |

A proxy signature scheme, introduced by Mambo, Usuda and Okamoto, allows an entity to delegate its signing rights to another entity. Identity based public key cryptosystems are a good alternative for a certificate based public key setting, especially when efficient key management and moderate security are required. From inception several ID-based proxy signature schemes have been discussed, but no more attention has been given to proxy signature with message recovery. In this paper, we are proposing provably secure ID-based proxy signature scheme with message recovery and we have proved that our scheme is secure as existential forgery-adaptively chosen message and ID attack. As proposed scheme is efficient in terms of communication overhead and security, it can be a good alternative for certificate based proxy signatures, used in various applications such as wireless e-commerce, mobile agents, mobile communication and distributed shared object systems, etc.
► We have designed a new provably secure identity based proxy signature scheme with message recovery.
► Scheme provides more efficiency in terms of communication overhead and computation.
► Scheme can be used for systems using low communication band width.
► We have proved the security under existential forgery-adaptively chosen message and ID attack.
Journal: Journal of Systems and Software - Volume 85, Issue 1, January 2012, Pages 209–214