A short identity-based proxy ring signature scheme from RSA

被引:11
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [31] Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Li, Fagen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 69 - 77
  • [32] Identity-Based Deterministic Signature Scheme without Forking-Lemma
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 79 - 95
  • [33] Revocable and strongly unforgeable identity-based signature scheme in the standard model
    Liu, Zhenhua
    Zhang, Xiangsong
    Hu, Yupu
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2422 - 2433
  • [34] A novel identity-based multi-signature scheme over NTRU lattices
    Chen, Xinjian
    Huang, Qiong
    Li, Hongbo
    Liao, Zhijian
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2022, 933 : 163 - 176
  • [35] A post-quantum communication secure identity-based proxy-signcryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Wen, Junwei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 147 - 165
  • [36] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [37] Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
    Chen, Yanan
    Yao, Ting
    Ren, Haiping
    Gan, Zehao
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 131 (03): : 1497 - 1513
  • [38] A Fuzzy Identity-Based Signcryption Scheme from Lattices
    Lu, Xiuhua
    Wen, Qiaoyan
    Li, Wenmin
    Wang, Licheng
    Zhang, Hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4203 - 4225
  • [39] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [40] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15