A short identity-based proxy ring signature scheme from RSA

被引:11
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [41] A new construction of identity-based group signature
    Ma, Liqiong
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2014, 6 (01) : 38 - 43
  • [42] Novel efficient identity-based signature on lattices
    Chen, Jiang-shan
    Hu, Yu-pu
    Liang, Hong-mei
    Gao, Wen
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (02) : 244 - 250
  • [43] EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack
    Xie, Yong
    Xu, Fang
    Li, Xiang
    Zhang, Songsong
    Zhang, Xiaodan
    Israr, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03): : 903 - 924
  • [44] An efficient identity-based proxy signcryption using lattice
    Zhu, Hongfei
    Wang, Ye
    Wang, Chonghua
    Cheng, Xiaochun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 : 321 - 327
  • [45] Securing Internet of Drones With Identity-Based Proxy Signcryption
    Khan, Muhammad Asghar
    Shah, Habib
    Rehman, Sajjad Ur
    Kumar, Neeraj
    Ghazali, Rozaida
    Shehzad, Danish
    Ullah, Insaf
    IEEE ACCESS, 2021, 9 : 89133 - 89142
  • [46] Fuzzy Identity-Based Identification Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    Moon, SangJae
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 123 - +
  • [47] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [48] Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe
    Zhang, Yanhua
    Gan, Yong
    Yin, Yifeng
    Jia, Huiwen
    Meng, Yinghui
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 573 - 584
  • [49] A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups
    Chen, Peixin
    Wang, Xiaofeng
    Su, Jinshu
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 46 - 56
  • [50] Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage
    Ni, Jianbing
    Zhang, Kuan
    Yu, Yong
    Yang, Tingting
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1753 - 1769