Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

被引:3
|
作者
Li Huixian [1 ,2 ]
Han Zhipeng [1 ]
Wang Liqin [1 ]
Pang Liaojun [2 ,3 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Shaanxi, Peoples R China
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Digital signatures; public key; blindness; security; PROTOCOLS;
D O I
10.1109/ACCESS.2018.2869041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.
引用
收藏
页码:53869 / 53881
页数:13
相关论文
共 50 条
  • [41] Threshold proxy re-signature: definition and new constructions
    Chen, Xi
    Liu, Yun
    Harn, Lein
    Li, Yong
    Yao, Ge
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2018, 41 (02) : 141 - 148
  • [42] Revocable identity-based designated verifier proxy re-signature with signature evolution
    Zhang, Qiu
    Sun, Yinxia
    Lu, Yang
    Huang, Wensheng
    COMPUTER STANDARDS & INTERFACES, 2024, 92
  • [43] Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
    Lv, Guoning
    Lei, Yanfang
    Hu, Mingsheng
    Cheng, Yage
    Gong, Bei
    Fu, Junjun
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 44 - 57
  • [44] Server-aided verification proxy re-signature
    Wang, Zhiwei
    Lv, Wei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1704 - 1707
  • [45] Proxy re-signature schemes without random oracles
    Shao, Jun
    Cao, Zhenfu
    Wang, Licheng
    Liang, Xiaohui
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 197 - 209
  • [46] A proxy blind signature scheme based on ECDLP
    Wang, H
    Wang, R
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (02): : 281 - 284
  • [47] A Proxy Blind Signature Scheme Based on DLP
    YU Baozheng
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 83 - 86
  • [48] Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Yuehai
    IEEE ACCESS, 2019, 7 : 37865 - 37875
  • [49] SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups
    Kanchan, Sneha
    Chaudhari, Narendra S.
    IEEE ACCESS, 2018, 6 : 59282 - 59295
  • [50] Remark on Shao et al's bidirectional proxy re-signature scheme in Indocrypt'07
    Kim, Kitae
    Yie, Ikkwon
    Lim, Seongan
    International Journal of Network Security, 2009, 9 (01) : 8 - 11