{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T17:10:48Z","timestamp":1694452248871},"reference-count":26,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T00:00:00Z","timestamp":1440720000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2016,3,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>5G mobile networks are promising to offer mobile users unrivaled experiences with infinite networking capability at any period and from anywhere. However, it appears unnecessary and impractical for the customers and servers to be connected permanently in wireless networks because battery life is a bottleneck in such kind of networks. Therefore, the authorized entity needs to delegate its right to others in order to ensure the services available. This paper aims to address the issue of delegating authentication in 5G networks by proposing a new proxy signature scheme with efficient proxy signing operations. Concretely, we present a new and efficient proxy signature algorithm whose unforgeability can be reduced to the well\u2010known discrete logarithm assumption. In the proposal, the original signer delegates his signing right by signing an exposure\u2010free chameleon hash value on the warrant, and the proxy signer can generate a proxy signature on a message only by calculating a chameleon hash collision between the warrant and the message. This approach is computationally cost\u2010effective for the proxy signer. Further analysis of the new scheme demonstrates that it offers the desirable properties of delegation of signing sights. Copyright \u00a9 2015 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/cpe.3581","type":"journal-article","created":{"date-parts":[[2015,9,2]],"date-time":"2015-09-02T11:17:54Z","timestamp":1441192674000},"page":"1193-1203","source":"Crossref","is-referenced-by-count":3,"title":["Delegation of signing rights for emerging 5G networks"],"prefix":"10.1002","volume":"28","author":[{"given":"Yongyong","family":"Ge","sequence":"first","affiliation":[{"name":"College of Engineering Peking University  Beijing 100871 China"}]},{"given":"Yannan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering University of Electronic Science and Technology of China  Chengdu 611731 China"}]},{"given":"Zhusong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Guangdong University of Technology  Guangzhou 510006 China"}]}],"member":"311","published-online":{"date-parts":[[2015,8,28]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"issue":"9","key":"e_1_2_8_3_1","first-page":"1338","article-title":"Proxy signature: delegation of the power to sign messages","volume":"79","author":"Mambo M","year":"1996","journal-title":"IEICE Transactions on Fundamentals"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47719-5_37"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9082-x"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_5"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.02.041"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596042_50"},{"key":"e_1_2_8_9_1","first-page":"473","volume-title":"Processing of MSN 2006","author":"Huang X","year":"2006"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.003"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2009.01.032"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.09.040"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0021-2"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0146-1"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0140-7"},{"key":"e_1_2_8_16_1","unstructured":"KrawczykH RabinT.Chameleon hashing and signatures.Proceedings of the Network and Distributed System Security Symposium NDSS 2000 The Internet Society 2000;143\u201354."},{"key":"e_1_2_8_17_1","first-page":"165","volume-title":"Processing of SCN 2004","author":"Ateniese G","year":"2004"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_19"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.06.022"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.12.012"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp044"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20045251"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0204"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt144"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_2_8_26_1","doi-asserted-by":"crossref","unstructured":"ShoupV.\u00a02008.A computational introduction to number theory and algebra.Cambridge University Press.","DOI":"10.1017\/CBO9780511814549"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.3581","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.3581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T21:41:38Z","timestamp":1693690898000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.3581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,28]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,3,25]]}},"alternative-id":["10.1002\/cpe.3581"],"URL":"https:\/\/doi.org\/10.1002\/cpe.3581","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,28]]}}}