A provably secure identity-based proxy ring signature based on RSA

被引:2
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
identity-based proxy ring signature; random oracle model; RSA assumption; SCHEME; EFFICIENT; POWER;
D O I
10.1002/sec.1076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring signature scheme using a new paradigm called sequential aggregation. The construction is proved secure, under the one-wayness assumption of RSA, in the random oracle model by presenting a new forking lemma. We should highlight that the proxy key exposure attack cannot be applied to our scheme. Further, in contrast to the existing schemes that are based on pairings, our scheme is based on RSA; therefore, it outperforms the existing schemes in terms of efficiency and practicality. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1223 / 1236
页数:14
相关论文
共 50 条
  • [21] Feasibility analysis of two identity-based proxy ring signature schemes
    Wang, Huaqun
    Zhang, Lijun
    Zhao, Junxi
    High Technology Letters, 2007, 13 (02) : 207 - 209
  • [22] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [23] Efficient and identity-based signcryption with provably-secure
    Wen Y.
    Ma J.
    Moon S.
    International Journal of Digital Content Technology and its Applications, 2010, 4 (07) : 148 - 153
  • [24] Provably secure identity-based commitment from lattice
    Sun, Weiwei
    Yang, Bo
    Huang, Qiong
    Xia, Feng
    Journal of Computational Information Systems, 2012, 8 (09): : 3679 - 3687
  • [25] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [26] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303
  • [27] An Identity-Based Proxy Signature on NTRU Lattice
    ZHU Hongfei
    TAN Yu'an
    YU Xiao
    XUE Yuan
    ZHANG Qikun
    ZHU Liehuang
    LI Yuanzhang
    ChineseJournalofElectronics, 2018, 27 (02) : 297 - 303
  • [28] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [29] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [30] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7