On Constructing Certificateless Proxy Signature from Certificateless Signature
Zhong-mei Wan,Xue-jia Lai,Jian Weng,Xuan Hong,Yu Long,Wei-wei Jia
DOI: https://doi.org/10.1007/s12204-008-0692-5
2008-01-01
Journal of Shanghai Jiaotong University (Science)
Abstract:In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B. Recently many identity-based (ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting. Certificateless cryptography can overcome the key escrow problem. In this paper, we present a general security model for certificateless proxy signature scheme. Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.