Anonymous, Timed and Revocable Proxy Signatures

被引:0
|
作者
Almashagbeh, Ghada [1 ]
Nitulescu, Anca [2 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
[2] IOG, Paris, France
来源
关键词
SCHEME; SECURE;
D O I
10.1007/978-3-031-75757-0_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature enables a party to delegate her signing power to another. This is useful in practice to achieve goals related to robustness, crowd-sourcing, and workload sharing. Such applications, especially in the blockchain model, usually require delegation to satisfy several properties, including time bounds, anonymity, revocability, and policy enforcement. Despite the large amount of work on proxy signatures in the literature, none of the existing schemes satisfy all these properties; even there is no unified formal notion that captures them. In this work, we close this gap and propose RelaySchnorr, an anonymous, timed, and revocable proxy signature scheme. We achieve this in two steps: First, we introduce a tokenizable digital signature based on Schnorr signature allowing for secure distribution of signing tokens. Second, we utilize a public bulletin board, instantiated as a blockchain, and timelock encryption to support: (1) one-time usage of the signing tokens by tracking tokens used so far based on unique values associated to them, (2) timed delegation so that a proxy signer cannot sign outside a given period, and (3) delegation revocation allowing the original signer to end a delegation earlier than provisioned. All of these are done in a decentralized and anonymous way so that no one can tell that someone else signed on behalf of the original signer or even that a delegation took place. We define a formal notion for proxy signatures capturing all these properties, and prove that our construction realizes this notion. We also discuss several design considerations addressing issues related to deployment in practice.
引用
收藏
页码:23 / 43
页数:21
相关论文
共 50 条
  • [1] Anonymous Proxy Signatures
    Fuchsbauer, Georg
    Pointcheval, David
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 201 - 217
  • [2] Deniable Proxy-Anonymous Signatures
    Fan, Chengyu
    Zhou, Shijie
    Li, Fagen
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2131 - 2136
  • [3] Revocable anonymous access to the Internet?
    Claessens, J
    Díaz, C
    Goemans, C
    Preneel, B
    Vandewalle, J
    Dumortier, J
    INTERNET RESEARCH, 2003, 13 (04) : 242 - 258
  • [4] Anonymous and revocable fingerprint recognition
    Farooq, Faisal
    Bolle, Ruud M.
    Jea, Tsai-Yang
    Ratha, Nalini
    2007 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOLS 1-8, 2007, : 2946 - +
  • [5] Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
    Fuchsbauer, Georg
    Pointcheval, David
    FORMAL TO PRACTICAL SECURITY, 2009, 5458 : 95 - 115
  • [6] Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains
    Bisht, Kanchan
    Kansagra, Neel Yogendra
    Ali, Reisha
    Shaik, Mohammed Sayeed
    Francis, Maria
    Kataoka, Kotaro
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1378 - 1393
  • [7] Anonymity revocable proxy signature scheme
    Fu Xiaotong
    Xiao Guozhen
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 718 - 720
  • [8] Revocable Quantum Timed-Release Encryption
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 129 - 146
  • [9] Revocable Quantum Timed-Release Encryption
    Unruh, Dominique
    JOURNAL OF THE ACM, 2015, 62 (06)
  • [10] Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
    Derler, David
    Hanser, Christian
    Slamanig, Daniel
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 49 - 65