Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

被引:3
|
作者
Li Huixian [1 ,2 ]
Han Zhipeng [1 ]
Wang Liqin [1 ]
Pang Liaojun [2 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Shaanxi, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Digital signatures; public key; blindness; security; PROTOCOLS;
D O I
10.1109/ACCESS.2018.2869041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.
引用
收藏
页码:53869 / 53881
页数:13
相关论文
共 50 条
  • [21] A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments
    Yang, Xiao-Dong
    Xiao, Li-Kun
    Chen, Chun-Lin
    Wang, Cai-Fen
    SYMMETRY-BASEL, 2018, 10 (11):
  • [22] Improvement of ID-based proxy re-signature scheme with pairing-free
    Zhang, Jianhong
    WIRELESS NETWORKS, 2019, 25 (07) : 4319 - 4329
  • [23] A multi-use unidirectional certificateless proxy re-signature scheme
    Wu, Yan
    Xiong, Hu
    Jin, Chuanjie
    TELECOMMUNICATION SYSTEMS, 2020, 73 (03) : 455 - 467
  • [24] Improvement of ID-based proxy re-signature scheme with pairing-free
    Jianhong Zhang
    Wireless Networks, 2019, 25 : 4319 - 4329
  • [25] Universally composable secure proxy re-signature scheme with effective calculation
    Xuan Hong
    Jianhua Gao
    Jianguo Pan
    Bo Zhang
    Cluster Computing, 2019, 22 : 10075 - 10084
  • [26] A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETs
    Hong, Xuan
    Long, Yu
    JOURNAL OF COMPUTERS, 2012, 7 (07) : 1796 - 1800
  • [27] A multi-use unidirectional certificateless proxy re-signature scheme
    Yan Wu
    Hu Xiong
    Chuanjie Jin
    Telecommunication Systems, 2020, 73 : 455 - 467
  • [28] Universally composable secure proxy re-signature scheme with effective calculation
    Hong, Xuan
    Gao, Jianhua
    Pan, Jianguo
    Zhang, Bo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10075 - S10084
  • [29] A NEW FORWARD-SECURE THRESHOLD PROXY RE-SIGNATURE SCHEME
    Yang, Xiaodong
    Wang, Caifen
    Zhang, Yulei
    Wei, Weiyi
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 566 - 569
  • [30] ID-based proxy re-signature without pairing
    Wang, Zhiwei
    Xia, Aidong
    He, Mingjun
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 217 - 222