A short ID-based proxy signature scheme

被引:12
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
identity-based signature; identity-based signature with message recovery; identity-based proxy signature; CDH assumption; random oracle model; MULTI-SIGNATURE; SECURE; EFFICIENT; CRYPTANALYSIS;
D O I
10.1002/dac.2820
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead because signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: the schemes of Singh and Verma and Yoon et al. Unfortunately, Tian et al., by presenting two forgery attacks, show that Singh and Verma scheme is not secure, and also, the scheme of Yoon et al. does not support provable security. The contributions of this paper are twofold. First, we review the scheme by Yoon et al. and discuss why it does not have message recovery property, and consequently, it is not short. Second, we propose a short identity-based proxy signature scheme with the help of message recovery property and show that it is secure under computational Diffie-Hellman assumption in the random oracle model. Furthermore, our scheme is more efficient than (as efficient as) previous identity-based proxy signatures. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:859 / 873
页数:15
相关论文
共 56 条
[1]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[2]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[3]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4377, P145
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]   A secure identity-based proxy multi-signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
INFORMATION SCIENCES, 2009, 179 (03) :292-302
[6]   A secure identity-based multi-proxy signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) :86-95
[7]  
Chen X., 2003, Proceedings of KIISC, V3, P11
[8]  
Choon J, P 6 INT WORKSH THEOR, V6, P18
[9]  
Gu C, P 3 SKLOIS C INF SEC
[10]  
Gu CX, 2005, LECT NOTES COMPUT SC, V3619, P1277