Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
462044 | Journal of Systems and Software | 2012 | 6 Pages |
A proxy signature scheme, introduced by Mambo, Usuda and Okamoto, allows an entity to delegate its signing rights to another entity. Identity based public key cryptosystems are a good alternative for a certificate based public key setting, especially when efficient key management and moderate security are required. From inception several ID-based proxy signature schemes have been discussed, but no more attention has been given to proxy signature with message recovery. In this paper, we are proposing provably secure ID-based proxy signature scheme with message recovery and we have proved that our scheme is secure as existential forgery-adaptively chosen message and ID attack. As proposed scheme is efficient in terms of communication overhead and security, it can be a good alternative for certificate based proxy signatures, used in various applications such as wireless e-commerce, mobile agents, mobile communication and distributed shared object systems, etc.
► We have designed a new provably secure identity based proxy signature scheme with message recovery. ► Scheme provides more efficiency in terms of communication overhead and computation. ► Scheme can be used for systems using low communication band width. ► We have proved the security under existential forgery-adaptively chosen message and ID attack.