{"title":"A controllable proxy signature scheme with revocation list","authors":"Jianhong Zhang, Wei Wang, Xue Liu","doi":"10.1109/ICASID.2010.5551485","DOIUrl":null,"url":null,"abstract":"Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.","PeriodicalId":391931,"journal":{"name":"2010 International Conference on Anti-Counterfeiting, Security and Identification","volume":"355 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Anti-Counterfeiting, Security and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2010.5551485","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with revocation list, by combining proxy signature, designated verifier signature and the revocation list. Then we show that the proposed is correct and secure in the random oracle model.