This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the securi...This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the security goals to capture which mean for a prox-ysignaturescheme to be secure. Then, we present an example of proxy signature scheme that can be proven securein the standard model.展开更多
An identity-based key-exchange protocol using a bilinear map is proposed andit is proved SK-sceure( session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diftie-Hellmen) assu...An identity-based key-exchange protocol using a bilinear map is proposed andit is proved SK-sceure( session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diftie-Hellmen) assumption is correct. Then we applythe signature-basedauthenticalor to our protocol and obtain an id entity-based key-exchange protocol that is SK-securein the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.展开更多
文摘This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the security goals to capture which mean for a prox-ysignaturescheme to be secure. Then, we present an example of proxy signature scheme that can be proven securein the standard model.
文摘An identity-based key-exchange protocol using a bilinear map is proposed andit is proved SK-sceure( session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diftie-Hellmen) assumption is correct. Then we applythe signature-basedauthenticalor to our protocol and obtain an id entity-based key-exchange protocol that is SK-securein the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.