Anonymous, Timed and Revocable Proxy Signatures

被引:0
|
作者
Almashagbeh, Ghada [1 ]
Nitulescu, Anca [2 ]
机构
[1] Univ Connecticut, Storrs, CT 06269 USA
[2] IOG, Paris, France
来源
关键词
SCHEME; SECURE;
D O I
10.1007/978-3-031-75757-0_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature enables a party to delegate her signing power to another. This is useful in practice to achieve goals related to robustness, crowd-sourcing, and workload sharing. Such applications, especially in the blockchain model, usually require delegation to satisfy several properties, including time bounds, anonymity, revocability, and policy enforcement. Despite the large amount of work on proxy signatures in the literature, none of the existing schemes satisfy all these properties; even there is no unified formal notion that captures them. In this work, we close this gap and propose RelaySchnorr, an anonymous, timed, and revocable proxy signature scheme. We achieve this in two steps: First, we introduce a tokenizable digital signature based on Schnorr signature allowing for secure distribution of signing tokens. Second, we utilize a public bulletin board, instantiated as a blockchain, and timelock encryption to support: (1) one-time usage of the signing tokens by tracking tokens used so far based on unique values associated to them, (2) timed delegation so that a proxy signer cannot sign outside a given period, and (3) delegation revocation allowing the original signer to end a delegation earlier than provisioned. All of these are done in a decentralized and anonymous way so that no one can tell that someone else signed on behalf of the original signer or even that a delegation took place. We define a formal notion for proxy signatures capturing all these properties, and prove that our construction realizes this notion. We also discuss several design considerations addressing issues related to deployment in practice.
引用
收藏
页码:23 / 43
页数:21
相关论文
共 50 条
  • [41] Anonymous signatures made easy
    Fischlin, Marc
    Public Key Cryptography - PKC 2007, 2007, 4450 : 31 - 42
  • [42] A new type of proxy ring signature scheme with revocable anonymity
    Hu, Chengyu
    Li, Daxing
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 866 - +
  • [43] Conversion schemes for unlinkable signatures that include revocable unlinkability
    Chida, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01) : 90 - 98
  • [44] Improved anonymous timed-release encryption
    Chalkias, Konstantinos
    Hristu-Varsakelis, Dimitrios
    Stephanides, George
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 311 - +
  • [45] Toward the fair anonymous signatures: Deniable ring signatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 54 - 64
  • [46] ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs
    Liu, Yang
    He, Debiao
    Luo, Min
    Wang, Huaqun
    Liu, Qin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (02) : 2482 - 2494
  • [47] Toward the fair anonymous signatures: Deniable ring signatures
    Komano, Y
    Ohta, K
    Shimbo, A
    Kawamura, S
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 174 - 191
  • [48] Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric
    Connolly, Aisling
    Deschamps, Jerome
    Lafourcade, Pascal
    Kempner, Octavio Perez
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 249 - 271
  • [49] Proxy signatures secure against proxy key exposure
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    Paterson, Kenneth G.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 141 - +
  • [50] A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS
    Yue, Xiaohan
    Zeng, Shuaishuai
    Wang, Xibo
    Yang, Lixin
    Xu, Jian
    Bai, Shi
    He, Yuan
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 232 - 239