Anonymous, Timed and Revocable Proxy Signatures

被引:0
|
作者
Almashagbeh, Ghada [1 ]
Nitulescu, Anca [2 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
[2] IOG, Paris, France
来源
关键词
SCHEME; SECURE;
D O I
10.1007/978-3-031-75757-0_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature enables a party to delegate her signing power to another. This is useful in practice to achieve goals related to robustness, crowd-sourcing, and workload sharing. Such applications, especially in the blockchain model, usually require delegation to satisfy several properties, including time bounds, anonymity, revocability, and policy enforcement. Despite the large amount of work on proxy signatures in the literature, none of the existing schemes satisfy all these properties; even there is no unified formal notion that captures them. In this work, we close this gap and propose RelaySchnorr, an anonymous, timed, and revocable proxy signature scheme. We achieve this in two steps: First, we introduce a tokenizable digital signature based on Schnorr signature allowing for secure distribution of signing tokens. Second, we utilize a public bulletin board, instantiated as a blockchain, and timelock encryption to support: (1) one-time usage of the signing tokens by tracking tokens used so far based on unique values associated to them, (2) timed delegation so that a proxy signer cannot sign outside a given period, and (3) delegation revocation allowing the original signer to end a delegation earlier than provisioned. All of these are done in a decentralized and anonymous way so that no one can tell that someone else signed on behalf of the original signer or even that a delegation took place. We define a formal notion for proxy signatures capturing all these properties, and prove that our construction realizes this notion. We also discuss several design considerations addressing issues related to deployment in practice.
引用
收藏
页码:23 / 43
页数:21
相关论文
共 50 条
  • [21] Revocable proxy signature scheme with efficient multiple delegations to the same proxy signer
    Lee, Ji-Seon
    Chang, Jik Hyun
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 193 - 197
  • [22] Anonymous Signatures Revisited
    Saraswat, Vishal
    Yun, Aaram
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 140 - 153
  • [23] Strong Anonymous Signatures
    Zhang, Rui
    Imai, Hideki
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 60 - 71
  • [24] Proxy confirmation signatures
    Wang, CH
    Chen, YC
    INFORMATICA, 2004, 15 (03) : 425 - 437
  • [25] On the revocation of proxy signatures
    Chien, Hung-Yu
    IMECS 2006: International Multiconference of Engineers and Computer Scientists, 2006, : 160 - 162
  • [26] RING PROXY SIGNATURES
    Wei Baodian* *** Zhang Fangguo* *** Chen Xiaofeng** *** *(Department of Electronics and Communication Engineering
    JournalofElectronics(China), 2008, (01) : 108 - 114
  • [27] Threshold proxy signatures
    Sun, HM
    Lee, NY
    Hwang, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05): : 259 - 263
  • [28] Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers
    Cao, Zhong
    Chen, Zhuo
    Shang, Wenli
    Zhu, Yongdong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10357 - 10367
  • [29] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [30] Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs
    Emek, Yuval
    Seidel, Jochen
    Wattenhofer, Roger
    AUTOMATA, LANGUAGES, AND PROGRAMMING (ICALP 2014), PT II, 2014, 8573 : 183 - 195