A provably secure identity-based proxy ring signature based on RSA

被引:2
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
identity-based proxy ring signature; random oracle model; RSA assumption; SCHEME; EFFICIENT; POWER;
D O I
10.1002/sec.1076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring signature scheme using a new paradigm called sequential aggregation. The construction is proved secure, under the one-wayness assumption of RSA, in the random oracle model by presenting a new forking lemma. We should highlight that the proxy key exposure attack cannot be applied to our scheme. Further, in contrast to the existing schemes that are based on pairings, our scheme is based on RSA; therefore, it outperforms the existing schemes in terms of efficiency and practicality. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1223 / 1236
页数:14
相关论文
共 50 条
  • [31] Identity-based ring signatures from RSA
    Herranz, Javier
    THEORETICAL COMPUTER SCIENCE, 2007, 389 (1-2) : 100 - 117
  • [32] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [33] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [34] Identity-based quotable ring signature
    Wang, Kefeng
    Mu, Yi
    Susilo, Willy
    INFORMATION SCIENCES, 2015, 321 : 71 - 89
  • [35] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [36] Identity-Based Sequential Aggregate Signature from RSA
    Dou, Bennian
    Zhang, Hong
    Xu, Chungen
    Han, Mu
    FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 123 - +
  • [37] Provably Secure Pairing-Free Identity-Based Restrictive Partially Blind Signature Scheme
    Cui, Wei
    Jia, Qian
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1038 - 1042
  • [38] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [39] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [40] Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem
    Dutta, Ratna
    Debnath, Sumit Kumar
    Biswas, Chinmoy
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 595 - 602