On-line/off-line proxy re-signatures

被引:0
作者
Lan, Caihui [1 ]
Wang, Caifen [1 ]
Yang, Xiaodong [1 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Lanzhou
关键词
Chameleon hash function; Discrete logarithm; On-line/off-line proxy re-signature;
D O I
10.4156/jcit.vol7.issue23.7
中图分类号
学科分类号
摘要
To improve the real-time efficiency of proxy re-signatures, a new primitive called on-line/offline proxy re-signatures is introduced in this paper. The idea is to split the re-signing procedure into two phases: the off-line and on-line phases. Most of the computations are carried out in the off-line phase while the on-line phase does not require any heavy computations such as exponentiations or pairings. It is particularly suitable for a scenario where the proxy must respond quickly once the message to be re-signed is presented. We propose a generic on-line/off-line proxy re-signature scheme, which can convert any existing secure proxy re-signature scheme into a highly efficient on-line/off-line proxy re-signature scheme. The on-line phase of our scheme is very efficient: computing a re-signature takes one modular subtraction and one modular multiplication. Our scheme is proven secure based on the discrete logarithm assumption and the unforgeability of the underlying proxy re-signature scheme.
引用
收藏
页码:49 / 56
页数:7
相关论文
共 19 条
[1]  
Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, Proceedings of EUROCRYPT, LNCS 1403, pp. 127-144, (1998)
[2]  
Zhang J., Cui Y., Min X., Zou J., An Efficient and Provably Secure Proxy Signature Scheme, JCIT, 6, 7, pp. 294-302, (2011)
[3]  
Luo W., Li C., Bai G., Chen L., A Certificateless Sequential Multi-Signature Scheme without Pairings, IJACT, 4, 9, pp. 193-199, (2012)
[4]  
Ateniese G., Hohenberger S., Proxy re-signatures: New definitions, algorithms and applications, Proceedings of ACM Conference On Computer and Communications Security, pp. 310-319, (2005)
[5]  
Shao J., Cao Z., Wang L., Liang X., Proxy re-signature schemes without random oracles, Proceedings of INDO-CRYPT 2007, LNCS 4859, pp. 260-276, (2008)
[6]  
Chow S.S.M., Phan R.C.-W., Proxy re-signatures in the standard model, Proceedings of 11th International Conference On Information Security, pp. 260-276, (2008)
[7]  
Libert B., Vergnaud D., Multi-use unidirectional proxy re-signatures, Proceedings of the 15th ACM Conference On CCS, pp. 511-520, (2008)
[8]  
Shao J., Wei G., Ling Y., Xie M., Unidirectional identity-based proxy re-signature, Proceedings of 2011 IEEE ICC, pp. 1-5, (2011)
[9]  
Shao J., Feng M., Zhu B., Cao Z., Liu P., The security model of unidirectional proxy re-signature with private re-signature key, Information Systems Security, LNCS, 4859, pp. 216-232, (2010)
[10]  
Deng Y., Ge S., Proxy re-signature scheme based on quadratic residues, Journal of Networks, 6, 10, pp. 1459-1465, (2011)