A New Designated Verifier Proxy Signature in Standard Model
Li-Hong Guo, Hai-Tao Wu, Qing Yang
Available Online December 2016.
- https://doi.org/10.2991/icwcsn-16.2017.32How to use a DOI?
- designated verifier proxy signature; security; attacks; standard model
- Proxy signature schemes have been suggested for use in a number of applications, so the security of proxy signature scheme is more and more important. However, at present, almost all the proxy signature schemas were proven secure in the random oracle model, which has received a lot of criticism. Recently, Yu et al. proposed a designated verifier proxy signature scheme without random oracles by using Waters hashing technique. The formal models and a strictly logical process were provided in this schema. But Kang et al. Show some attacks on Yu et al.s scheme and offer its insecurity proof. In this paper, in order to overcome the weaknesses in Yu et al.s scheme we make supplements on it and make it secure resist Kang et al.s attacks.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Li-Hong Guo AU - Hai-Tao Wu AU - Qing Yang PY - 2016/12 DA - 2016/12 TI - A New Designated Verifier Proxy Signature in Standard Model BT - 3rd International Conference on Wireless Communication and Sensor Networks (WCSN 2016) PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/icwcsn-16.2017.32 DO - https://doi.org/10.2991/icwcsn-16.2017.32 ID - Guo2016/12 ER -