On-line/off-line proxy re-signatures

被引:0
作者
Lan, Caihui [1 ]
Wang, Caifen [1 ]
Yang, Xiaodong [1 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Lanzhou
关键词
Chameleon hash function; Discrete logarithm; On-line/off-line proxy re-signature;
D O I
10.4156/jcit.vol7.issue23.7
中图分类号
学科分类号
摘要
To improve the real-time efficiency of proxy re-signatures, a new primitive called on-line/offline proxy re-signatures is introduced in this paper. The idea is to split the re-signing procedure into two phases: the off-line and on-line phases. Most of the computations are carried out in the off-line phase while the on-line phase does not require any heavy computations such as exponentiations or pairings. It is particularly suitable for a scenario where the proxy must respond quickly once the message to be re-signed is presented. We propose a generic on-line/off-line proxy re-signature scheme, which can convert any existing secure proxy re-signature scheme into a highly efficient on-line/off-line proxy re-signature scheme. The on-line phase of our scheme is very efficient: computing a re-signature takes one modular subtraction and one modular multiplication. Our scheme is proven secure based on the discrete logarithm assumption and the unforgeability of the underlying proxy re-signature scheme.
引用
收藏
页码:49 / 56
页数:7
相关论文
共 19 条
[11]  
Guo D., Wei P., Danyu X.Y., A certificateless proxy re-signature scheme, Proceedings of IEEE ICCSIT 2010, pp. 157-161, (2010)
[12]  
Hong X., Chen K., Wan Z., Simplified universally composable proxy re-signature, Journal of Software, 21, 8, pp. 2079-2088, (2010)
[13]  
Yang P., Cao Z., Dong X., Threshold proxy re-signature, Journal of Systems Science and Complexity, 24, 4, pp. 816-824, (2011)
[14]  
Yang X., Wang C., Threshold proxy re-signature schemes in the standard model, Chinese Journal of Electronics, 19, 2 E, pp. 345-350, (2010)
[15]  
Shamir A., Tauman Y., Improved on-line/off-line signature schemes, Proceedings of CRYPTO'01, LNCS 2139, pp. 355-367, (2001)
[16]  
Krawczyk H., Rabin T., Chameleon hashing and signatures, Annual Network and Distributed System Security Symposium, pp. 143-154, (2000)
[17]  
Goldwasser S., Micali S., Ronald L., Rivest A., A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal On Computing, 17, 2, pp. 281-308, (1998)
[18]  
Bresson E., Catalano D., Gennaro R., Improved on-line/off-line threshold signatures, Proceedings of PKC 2007, pp. 217-232, (2007)
[19]  
Gao C.-Z., Wei B., Xie D., Chunmingtang, Divisible on-line/off-line signatures, Proceedings of CT-RSA 2009, pp. 562-566, (2009)