A provably secure identity-based proxy ring signature based on RSA

被引:2
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
identity-based proxy ring signature; random oracle model; RSA assumption; SCHEME; EFFICIENT; POWER;
D O I
10.1002/sec.1076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring signature scheme using a new paradigm called sequential aggregation. The construction is proved secure, under the one-wayness assumption of RSA, in the random oracle model by presenting a new forking lemma. We should highlight that the proxy key exposure attack cannot be applied to our scheme. Further, in contrast to the existing schemes that are based on pairings, our scheme is based on RSA; therefore, it outperforms the existing schemes in terms of efficiency and practicality. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1223 / 1236
页数:14
相关论文
共 50 条
  • [41] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [42] Secure and efficient identity-based proxy multi-signature using cubic residues
    Chang, Chin-Chen (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (18):
  • [43] Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
    Li, Fengyin
    Yang, Mengjiao
    Song, Zhihao
    Wang, Ping
    Li, Guoping
    ENTROPY, 2023, 25 (08)
  • [44] Provably secure RSA-type signature based on conic curve
    Dong, Xiaolei
    Qian, Haifeng
    Cao, Zhenfu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (02): : 217 - 225
  • [45] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [46] Provably Secure Identity-Based Threshold Decryption on Access Structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 464 - 468
  • [47] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [48] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [49] Identity-Based Aggregate and Multi-Signature Schemes Based on RSA
    Bagherzandi, Ali
    Jarecki, Stanislaw
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 480 - 498
  • [50] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71