A short identity-based proxy ring signature scheme from RSA

被引:11
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [31] Identity-based ring signature scheme based on quadratic residues
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    High Technology Letters, 2009, 15 (01) : 94 - 100
  • [33] Identity-based Ring Signature Scheme Based on Cubic Residues
    Dong, Xuedong
    Liu, Xinxin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 897 - 900
  • [34] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [35] An efficient identity-based short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 725 - +
  • [36] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [37] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [38] Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme
    Kar, Jayaprakash
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 291 - 300
  • [39] Feasibility analysis of two identity-based proxy ring signature schemes
    Wang, Huaqun
    Zhang, Lijun
    Zhao, Junxi
    High Technology Letters, 2007, 13 (02) : 207 - 209
  • [40] On the security of an identity-based threshold proxy signature scheme with known signers
    Lu, Rongbo
    He, Dake
    Wang, Changji
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 210 - +