Improvement of ID-based proxy re-signature scheme with pairing-free

被引:0
|
作者
Jianhong Zhang
机构
[1] North China University of Technology,School of Information Sciences and Technology
[2] National Engineering Laboratory for Big Data Collaborative Security Technology,undefined
[3] Guangxi Key Laboratory of Cryptography and Information Security,undefined
来源
Wireless Networks | 2019年 / 25卷
关键词
Identity-based proxy re-signature; Universal forgeability; Security attack; The improved scheme;
D O I
暂无
中图分类号
学科分类号
摘要
As an all-important cryptographical technique, proxy re-signature (PRS) is broadly applied to distributed computation, copyright transfer and hidden path transfer because it permits a proxy to translate an entity’s signature into another entity’s signature on the identical message. Most existing PRS schemes make use of time-consuming pairing computation. Recently, to discard time-consuming pairing operator and complicated certificate-management, Wang et al. proposed two efficient pairing-free ID-based PRS schemes, and declared that their schemes were provably secure in the ROM. Very unluckily, in this investigation, we point out that Wang et al.’s schemes suffer from attacks of universal forgery by analyzing their security, i.e., any one can fabricate a signature on arbitrary data. After the relevant attacks are shown, the reasons which result in such attacks are analyzed. Finally, to address the above-mentioned attacks, we put forward an improved ID-based PRS scheme. The improved scheme not only preserves all advantages of Wang et al.’s scheme, but also is demonstrated to be provably secure in the ROM. Compared with the other two ID-PRS schemes, our improved ID-PRS scheme offers more advantages in respect of the overall performance and security.
引用
收藏
页码:4319 / 4329
页数:10
相关论文
共 50 条
  • [31] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [32] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [33] A unidirectional certificateless proxy re-signature scheme based on lattice
    Zhou, YiHua
    Dong, SongShou
    Yang, YuGuang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (04)
  • [34] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [35] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [36] An Enhanced ID-Based Anonymous Proxy Signature Scheme on Pairings
    Hu, Chengyu
    Liu, Pengtao
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 4, 2010, : 343 - 346
  • [37] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [38] ID-based chameleon signature scheme from bilinear pairing
    Du, X.-J. (dxjwy2002@hotmail.com), 2005, South China University of Technology (33):
  • [39] An ID-based aggregate signature scheme with constant pairing computations
    Shim, Kyung-Ah
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (10) : 1873 - 1880
  • [40] An ID-based proxy signature scheme secure against proxy key exposure
    Wen F.
    Cui S.
    Cui J.
    International Journal of Advancements in Computing Technology, 2011, 3 (05) : 108 - 116