<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">info21209</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2010.288</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>A Provably Secure Proxy Signature Scheme in Certificateless Cryptography</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Xiong</surname>
						<given-names>Hu</given-names>
					</name>
					<email xlink:href="mailto:xionghu.uestc@gmail.com">xionghu.uestc@gmail.com</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Li</surname>
						<given-names>Fagen</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Qin</surname>
						<given-names>Zhiguang</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, P.R. China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2010</year>
			</pub-date>
			<volume>21</volume>
			<issue>2</issue>
			<fpage>277</fpage>
			<lpage>294</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>12</month>
					<year>2008</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>05</month>
					<year>2009</year>
				</date>
			</history>
			<abstract>
				<p>A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of certificateless public key cryptography was introduced. In this paper, we first present a security model for certificateless proxy signature schemes, and then propose an efficient construction based on bilinear pairings. The security of the proposed scheme can be proved to be equivalent to the computational Diffie–Hellman problem in the random oracle with a tight reduction.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>proxy signature</kwd>
				<kwd>certificateless cryptography</kwd>
				<kwd>provable security</kwd>
				<kwd>random oracle model</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>