A short identity-based proxy ring signature scheme from RSA

被引:11
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [1] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [2] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [3] An identity-based proxy ring signature scheme from bilinear pairings
    Cheng, WQ
    Lang, WM
    Yang, ZK
    Liu, G
    Tan, YM
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 424 - 429
  • [4] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [5] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [6] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [7] IDENTITY-BASED SEQUENTIAL AGGREGATE SIGNATURE SCHEME BASED ON RSA
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    Xu, Chungen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (09): : 6401 - 6413
  • [8] New Identity-based Sequential Aggregate Signature Scheme from RSA
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 136 - 140
  • [9] A short and highly efficient identity-based designated verifier proxy signature scheme
    Hu, Xiaoming
    Wang, Jian
    Xu, Huajie
    Tan, Wenan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 907 - 916
  • [10] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149