Abstract—Currently, ID-based public key cryptography has got many useful achievements and attracted much attention. Proxy signature scheme enables an original signer to delegate his\her signing capability to a proxy signer to sign messages on behalf of the original signer. In this paper, we will theoretically discuss on the provable security of an ID-based proxy signature scheme. In fact, we analyze the ID-based proxy signature scheme proposed by Mala et al.’s and show that this scheme is secure in the random oracle model. We show that their scheme’s security can be reduced to the hardness of CDHP.
Index Terms—ID-based proxy signature scheme, provable security, random oracle model, pairing.
Mohammad Beheshti-Atashgah is with the Research Center of Intelligent
Signal Processing, Tehran, Iran. (e-mail: M.Beheshti.A@ gmail.com).
Mahmoud Gardeshi is with Department of Electrical and Computer
Engineering, Imam Hossein University, Tehran, Iran (e-mail:
mgardeshi@ihu.ac.ir).
Majid Bayat is with Department of Mathematics & Computer Science,
Tarbiat Moallem University, Tehran, Iran (e-mail: Bayat@tmu.ac.ir).
Cite: Mohammad Beheshti-Atashgah, Mahmoud Gardeshi, and Majid Bayat, "Formal Security of an Identity-Based Proxy Signature Scheme in the Random Oracle Model," International Journal of Machine Learning and Computing vol. 2, no. 3, pp. 298-300, 2012.