Forward Secure Certificateless Proxy Signature Scheme

  • Jiguo Li
  • Yanqiong Li
  • Yichen Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


In order to deal with key exposure problem, we introduce forward secure technique into certificateless proxy signature scheme, and propose the formal definition and security model of forward secure certificateless proxy signature. Furthermore, we present a construction of forward secure certificateless proxy signature scheme with bilinear maps. Based on the difficulty of computational Diffie-Hellman problem, we prove the scheme is secure against chosen message attack in the random oracle model.


forward secure certificateless proxy signature computational Diffie-Hellman problem random oracle model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Transactions on Fundamentals E79-A(9), 1338–1353 (1996)Google Scholar
  2. 2.
    Huang, X.Y., Mu, Y., Sulilo, W., Zhang, F.T.: Short Designed Verifier Proxy Signature from Pairings. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC Workshops 2005. LNCS, vol. 3823, pp. 835–844. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Zhang, F.G., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Wang, H., Pieprzyk, J.: Efficient One-Time Proxy Signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507–522. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Yap, W., Heng, S., Goi, B.: Cryptanalysis of Some Proxy Signature Schemes without Certificates. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 115–126. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Chen, H., Zhang, F.T., Song, R.S.: Certificateless Proxy Signature with Provable Security. Journal of Software 20(3), 692–701 (2009)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Xiong, H., Li, F.G., Qin, Z.G.: A Provably Secure Proxy Signature Scheme in Certificateless Cryptography. International Journal of Informatica 21(2), 277–294 (2010)MathSciNetzbMATHGoogle Scholar
  9. 9.
    Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy Signatures Secure against Proxy Key Exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  10. 10.
    Anderson, R.: Two Remarks on Public Key Cryptology. Invited lecture. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (1997)Google Scholar
  11. 11.
    Bellare, M., Miner, S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  12. 12.
    Itkis, G., Reyzin, L.: Forward-Secure Signatures with Optimal Signing and Verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 332–354. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Kang, B.G., Park, J.H., Hahn, S.G.: A New Forward Secure Signature Scheme (2004),
  14. 14.
    Nakanishi, T., Hira, Y., Funabiki, N.: Forward-Secure Group Signatures from Pairings. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 171–186. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  15. 15.
    Malkin, T., Micciancio, D., Miner, S.: Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 400–417. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  16. 16.
    Alomair, B., Sampigethaya, K., Poovendran, R.: Efficient Generic Forward-Secure Signatures and Proxy Signatures. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 166–181. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  17. 17.
    Yu, J., Kong, F.Y., Cheng, X.G., Hao, R., Li, G.W.: Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 83–97. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  18. 18.
    Chen, H.B., Yang, X.Y., Liang, Z.Y., Wu, X.G.: Forward Secure Certificateless Proxy Signature Scheme. Computer Engineering 36(2), 156–157 (2010)Google Scholar
  19. 19.
    Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless Signature Revisited. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 308–322. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  20. 20.
    Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology 13(3), 361–396 (2000)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jiguo Li
    • 1
  • Yanqiong Li
    • 1
  • Yichen Zhang
    • 1
  1. 1.College of Computer and Information EngineeringHohai UniversityNanjingChina

Personalised recommendations