Reference Hub3
Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery

Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery

Salome James, Gowri Thumbur, Vasudeva Reddy P.
Copyright: © 2021 |Volume: 15 |Issue: 1 |Pages: 21
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859864|DOI: 10.4018/IJISP.2021010106
Cite Article Cite Article

MLA

James, Salome, et al. "Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery." IJISP vol.15, no.1 2021: pp.117-137. http://doi.org/10.4018/IJISP.2021010106

APA

James, S., Thumbur, G., & Vasudeva Reddy P. (2021). Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery. International Journal of Information Security and Privacy (IJISP), 15(1), 117-137. http://doi.org/10.4018/IJISP.2021010106

Chicago

James, Salome, Gowri Thumbur, and Vasudeva Reddy P. "Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery," International Journal of Information Security and Privacy (IJISP) 15, no.1: 117-137. http://doi.org/10.4018/IJISP.2021010106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In many real-world situations, signature schemes with message recovery plays a very important role to minimize the bandwidth for efficient communications. A proxy signature scheme is a kind of digital signature scheme that allows an original signer to designate his/her signing capacity to a proxy signer. The proxy signer generates a signature on a message on behalf of the original signer. Such signatures are very useful in various applications where the delegation rights is quite common, especially in distributed systems and grid computing. This paper presents a pairing-free proxy signature with message recovery scheme that integrates the advantages of proxy signatures and message recovery in identity based setting. This scheme improves the computational and communicational efficiency due to pairing-free and message recovery features. The proposed scheme is proven secure in the random oracle model under the hardness assumption of the ECDLP. The comparison results shows that the proposed scheme is superior to the related works from the aspect of security and performance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.