A short identity-based proxy ring signature scheme from RSA

被引:11
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [21] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [22] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [23] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [24] On the security of an identity-based proxy multi-signature scheme
    Wang, B.
    IET INFORMATION SECURITY, 2010, 4 (02) : 45 - 48
  • [26] Identity-Based Sequential Aggregate Signature from RSA
    Dou, Bennian
    Zhang, Hong
    Xu, Chungen
    Han, Mu
    FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 123 - +
  • [27] Identity-based traceable ring signature scheme on lattice
    Ye Q.
    Chen Q.
    Dou Y.
    Zhang J.
    Tang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 161 - 168
  • [28] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [29] An identity-based ring signature scheme with enhanced privacy
    Gamage, Chandana
    Gras, Ben
    Crispo, Bruno
    Tanenbaum, Andrew S.
    2006 SECURECOMM AND WORKSHOPS, 2006, : 257 - +
  • [30] Identity-based forward secure threshold signature scheme based on mediated rsa
    Yu J.
    Hao R.
    Kong F.
    Cheng X.
    Zhao H.
    Chen Y.
    International Journal of Computers and Applications, 2010, 32 (04) : 469 - 475