Universally composable secure proxy re-signature scheme with effective calculation

被引:2
作者
Hong, Xuan [1 ]
Gao, Jianhua [1 ]
Pan, Jianguo [1 ]
Zhang, Bo [1 ]
机构
[1] Shanghai Normal Univ, Dept Comp Sci, Shanghai 200234, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2019年 / 22卷 / Suppl 4期
基金
中国国家自然科学基金;
关键词
Proxy re-signature; Unidirectional; Universally composable security; Provable security; Computational Diffie-Hellman assumption; PROTOCOLS;
D O I
10.1007/s10586-017-1074-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A's signature into another user B's signature on the same message m. This has numerous application, such as simplifying the certificate management by constructing a secure channel between two authentication centers, simplifying group signature management by making each signature transformed to the group's signature, helping relieve some common key management headaches by resigning without the authentication center, and constructing digital right management (DRM) interoperable system by sharing the certification. In this paper, we proposed a novel proxy re-signature scheme with universally composable security. The proposed scheme is unidirectional, single-use, key optimal, non-transitive and non-temporary. Its security is based on Computational Diffie-Hellman assumption in the random oracle model. Furthermore, we present the universal composable based security definition of proxy re-signature, as well as the equivalent game based definition. If a scheme is proved to be safe in our game, it will have the universally composable property, which will simplify the future security analysis. Finally, we support the proposed scheme with detailed security and performance analysis.
引用
收藏
页码:S10075 / S10084
页数:10
相关论文
共 25 条
  • [1] [Anonymous], 2005, P NETW DISTR SYST SE
  • [2] Ateniese G., 2005, P 12 ACM C COMP COMM, P310
  • [3] Backes M, 2004, LECT NOTES COMPUT SC, V3225, P61
  • [4] Universally composable protocols with relaxed set-up assumptions
    Barak, B
    Canetti, R
    Nielsen, JB
    Pass, R
    [J]. 45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, : 186 - 195
  • [5] Bellare M., 2013, ACM 1993
  • [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [7] Blaze M., 1997, TECHNICAL REPORTS
  • [8] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [9] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [10] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145