A provably secure identity-based proxy ring signature based on RSA

被引:2
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
identity-based proxy ring signature; random oracle model; RSA assumption; SCHEME; EFFICIENT; POWER;
D O I
10.1002/sec.1076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring signature scheme using a new paradigm called sequential aggregation. The construction is proved secure, under the one-wayness assumption of RSA, in the random oracle model by presenting a new forking lemma. We should highlight that the proxy key exposure attack cannot be applied to our scheme. Further, in contrast to the existing schemes that are based on pairings, our scheme is based on RSA; therefore, it outperforms the existing schemes in terms of efficiency and practicality. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1223 / 1236
页数:14
相关论文
共 50 条
  • [1] A short identity-based proxy ring signature scheme from RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    COMPUTER STANDARDS & INTERFACES, 2015, 38 : 144 - 151
  • [2] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [3] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [4] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [5] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [6] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [7] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [8] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 55 - 67
  • [9] Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
    Wang, Yang
    Wang, Mingqiang
    Zou, Jingdan
    Xu, Jin
    Wang, Jing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [10] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302