An improved efficient identity-based proxy signature in the standard model

被引:2
|
作者
Hu, XiaoMing [1 ]
Wang, Jian [1 ]
Xu, HuaJie [2 ]
Yang, YinChun [1 ]
Xu, XiaoLin [1 ]
机构
[1] Shanghai Second Polytech Univ, Coll Comp & Informat Engn, Shanghai 201209, Peoples R China
[2] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; identity-based proxy signature; identity-based cryptography; standardmodel; computational Diffie-Hellman; SCHEME; CONSTRUCTION;
D O I
10.1080/00207160.2015.1086759
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Many identity-based proxy signature (IBPS) schemes have been proposed, but most were proved to be secure using a random oracle model, which has attracted considerable criticism. Cao and Cao proposed an IBPS scheme using the standard model, but their scheme was shown to be insecure because it could not resist a delegator attack. In order to overcome this weakness, Gu et al. proposed a new IBPS scheme in 2013 that uses the standard model and they also provided a detailed security model for IBPS. However, in this study, we demonstrate that Gu et al.'s scheme is still vulnerable to delegator attack. In order to correct this problem, we propose an improvement of the IBPS scheme described by Gu et al. We also present an efficiency analysis for our scheme and a detailed security proof based on the computational Diffie-Hellman assumption.
引用
收藏
页码:22 / 38
页数:17
相关论文
共 50 条
  • [1] Efficient Identity-Based Proxy Signature in the Standard Model
    Gu, Ke
    Jia, Weijia
    Jiang, Chunlin
    COMPUTER JOURNAL, 2015, 58 (04): : 792 - 807
  • [2] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
    He, Debiao
    Zhang, Mingwu
    Xu, Baowen
    COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
  • [3] Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model
    Hu, Xiaoming
    Yang, Yinchun
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (02) : 758 - 761
  • [4] An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction
    Hu, Xiaoming
    Lu, Hong
    Xu, Huajie
    Wang, Jian
    Yang, Yinchun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 309 - 319
  • [5] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [6] An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model
    Li, Wang
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 167 - 172
  • [7] Identity-Based Multi-Proxy Signature Scheme in the Standard Model
    Gu, Ke
    Jia, Weijia
    Zhang, Jianming
    FUNDAMENTA INFORMATICAE, 2017, 150 (02) : 179 - 210
  • [8] A generic construction of identity-based proxy signature scheme in the standard model
    Hu X.
    Xu H.
    Wang J.
    Tan W.
    Yang Y.
    International Journal of Information and Computer Security, 2019, 11 (01) : 83 - 100
  • [9] Revocable identity-based proxy re-signature scheme in the standard model
    Yang X.
    Li Y.
    Wang J.
    Ma T.
    Wang C.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 153 - 162
  • [10] Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie–Hellman Problem
    Xiaoming Hu
    Xiaojun Zhang
    Jian Wang
    Huajie Xu
    Wenan Tan
    Yinchun Yang
    Arabian Journal for Science and Engineering, 2017, 42 : 639 - 649