In:
The Computer Journal, Oxford University Press (OUP), Vol. 63, No. 8 ( 2020-08-20), p. 1139-1147
Abstract:
In certificateless proxy signature (CLPS), the key generation center is responsible for initializing the system parameters and can obtain the opportunity to adaptively set some trapdoors in them when wanting to launch some attacks. Until now, how to withstand the malicious-but-passive key generation center (MKGC) attacks in CLPS is still an interesting problem. In this paper, we focus on the challenging issue and introduce a CLPS scheme provably secure in the standard model. To the best of our knowledge, we are the first to demonstrate its security under MKGC attacks by adopting the technology of embedding the classic difficulty problems into the target entity public key rather than the system parameters during the security proof process.
Type of Medium:
Online Resource
ISSN:
0010-4620
,
1460-2067
DOI:
10.1093/comjnl/bxz122
Language:
English
Publisher:
Oxford University Press (OUP)
Publication Date:
2020
detail.hit.zdb_id:
1477172-X
Permalink