Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

被引:3
|
作者
Li Huixian [1 ,2 ]
Han Zhipeng [1 ]
Wang Liqin [1 ]
Pang Liaojun [2 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Shaanxi, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Digital signatures; public key; blindness; security; PROTOCOLS;
D O I
10.1109/ACCESS.2018.2869041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.
引用
收藏
页码:53869 / 53881
页数:13
相关论文
共 50 条
  • [1] Partial Blind Proxy Re-signature Scheme for Mobile Internet
    Lei, Yanfang
    Jia, Zhijuan
    Wang, Lipeng
    Gong, Bei
    Cheng, Yage
    Fu, Junjun
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 16 - 30
  • [2] Partially blind proxy re-signature scheme with proven security
    Yang X.
    Chen C.
    Yang P.
    An F.
    Ma T.
    Wang C.
    2018, Editorial Board of Journal on Communications (39): : 61 - 68
  • [3] A Certificateiess Proxy Re-Signature Scheme
    Guo Duntao
    Wei Ping
    Yu Dan
    Yang Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 157 - 161
  • [4] Proxy re-signature scheme based on quadratic residues
    Yuqiao D.
    Ge S.
    Journal of Networks, 2011, 6 (10) : 1459 - 1465
  • [5] Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme
    Hu, Xiaoming
    Jiang, Wenrong
    Ma, Chuang
    Yu, Chengcheng
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 12 - 16
  • [6] Proxy re-signature scheme for stream exchange
    School of Computer & Information Technology, Beijing Jiaotong University, Beijing
    100044, China
    不详
    450000, China
    不详
    450000, China
    Ruan Jian Xue Bao, 1 (129-144):
  • [7] Message Authentication Scheme for VANET Based on Proxy Re-Signature
    Yang, Xiaodong
    An, Faying
    Yang, Ping
    Wu, Xiaobo
    Li, Yutong
    Xiao, Likun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [8] A unidirectional certificateless proxy re-signature scheme based on lattice
    Zhou, YiHua
    Dong, SongShou
    Yang, YuGuang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [9] Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
    Tang, Shaohua
    Xu, Lingling
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 91 - 97
  • [10] Proxy Re-signature Scheme from CBS to IBS
    Yang, Haibin
    Sun, Juanli
    Wang, Xu An
    Cui, Jian
    MULTI-FUNCTIONAL MATERIALS AND STRUCTURES ENGINEERING, ICMMSE 2011, 2011, 304 : 355 - +