An improved efficient identity-based proxy signature in the standard model

被引:3
作者
Hu, XiaoMing [1 ]
Wang, Jian [1 ]
Xu, HuaJie [2 ]
Yang, YinChun [1 ]
Xu, XiaoLin [1 ]
机构
[1] Shanghai Second Polytech Univ, Coll Comp & Informat Engn, Shanghai 201209, Peoples R China
[2] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; identity-based proxy signature; identity-based cryptography; standardmodel; computational Diffie-Hellman; SCHEME; CONSTRUCTION;
D O I
10.1080/00207160.2015.1086759
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Many identity-based proxy signature (IBPS) schemes have been proposed, but most were proved to be secure using a random oracle model, which has attracted considerable criticism. Cao and Cao proposed an IBPS scheme using the standard model, but their scheme was shown to be insecure because it could not resist a delegator attack. In order to overcome this weakness, Gu et al. proposed a new IBPS scheme in 2013 that uses the standard model and they also provided a detailed security model for IBPS. However, in this study, we demonstrate that Gu et al.'s scheme is still vulnerable to delegator attack. In order to correct this problem, we propose an improvement of the IBPS scheme described by Gu et al. We also present an efficiency analysis for our scheme and a detailed security proof based on the computational Diffie-Hellman assumption.
引用
收藏
页码:22 / 38
页数:17
相关论文
共 22 条
[1]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P171
[2]   Secure Proxy Signature Schemes for Delegation of Signing Rights [J].
Boldyreva, Alexandra ;
Palacio, Adriana ;
Warinschi, Bogdan .
JOURNAL OF CRYPTOLOGY, 2012, 25 (01) :57-115
[3]   The random oracle methodology, revisited [J].
Canetti, R ;
Goldreich, O ;
Halevi, S .
JOURNAL OF THE ACM, 2004, 51 (04) :557-594
[4]  
Feng Cao, 2010, Proceedings of the 2010 IEEE International Conference on Granular Computing (GrC-2010), P67, DOI 10.1109/GrC.2010.174
[5]  
Galindo D, 2006, LECT NOTES COMPUT SC, V4284, P178
[6]  
Gu CX, 2005, LECT NOTES COMPUT SC, V3619, P1277
[7]  
Gu K., 2013, COMPUT J, V11, P1
[8]   A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) :55-67
[9]  
Kim KS, 2013, J COMMUN NETW-S KOR, V15, P1, DOI [10.1109/JCN.2013.000003, 10.12812/ksms.2013.15.2.1]
[10]  
Lee Byoungcheon., 2001, P SCIS S CRYPTOGRAPH, V2/2, P603