Revocable identity-based designated verifier proxy re-signature with signature evolution

被引:0
|
作者
Zhang, Qiu [1 ]
Sun, Yinxia [1 ]
Lu, Yang [1 ]
Huang, Wensheng [2 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Elect Informat, Nanjing 210023, Peoples R China
[2] Nanjing Open Univ, Sch Intelligent Engn, Nanjing 211200, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; User revocation; Signature evolution; Designated verifier; EFFICIENT; SCHEME;
D O I
10.1016/j.csi.2024.103894
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy re-signature (IDPRS) enables a semi-trusted proxy to convert one user's signature to another user's for the same message without revealing any secret information of both users' signing keys. In IDPRS, user revocation is a necessary problem arising from privilege expiry or private key compromise. A revoked user cannot produce new signatures including re-signatures from the proxy. There is a need for some applications like a contract management system to keep expired message and signature pairs valid in the next period. The conventional solution is to require the unrevoked users to sign these messages again, which burdens users heavily. Therefore, establishing an IDPRS system with revocation and efficient signature updating is crucial. This paper introduces the concept of revocable IDPRS with signature evolution, facilitating efficient signature updating. The signature evolution enables the proxy to batch update non-revoked users' signatures from old ones to new ones, while also offering precise execution of signature updates on specific messages. Moreover, to further protect the privacy of signature validity, we employ designated verifier in our scheme. Formal security proofs are provided, and performance evaluation demonstrates our scheme's lower computation costs for signature updating and its comprehensive security attributes.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Designated-verifier chameleon proxy signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 554 - 561
  • [32] Designated-verifier proxy signature schemes
    Wang, GL
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 409 - 423
  • [33] Designated-verifier proxy signature schemes
    Wang, Guilin (glwang@iZr.a-star.edtsg), 1600, (Springer Science and Business Media, LLC):
  • [34] Designated-Verifier Chameleon Proxy Signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 29 - 29
  • [35] RETRACTED: Identity-Based Designated-Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System (Retracted Article)
    Zhou, Yuping
    Hu, Yu
    Chen, Jianneng
    Huang, Zengjie
    Huang, Hui
    Zhang, Yi Fan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [36] Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System
    Lin, Han-Yu
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (04) : 315 - 321
  • [37] The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
    Shao, Jun
    Feng, Min
    Zhu, Bin
    Cao, Zhenfu
    Liu, Peng
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 216 - +
  • [38] An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability
    Ding, Zhengyan
    Han, Lu
    Zhang, Chao
    Luo, Xizhao
    Qin, Bo
    Yang, Anjia
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 17552 - 17566
  • [39] Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability
    Tang, Fei
    Lin, Changlu
    Li, Yong
    Zhang, Shengyuan
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 800 - 805
  • [40] A new efficient identity-based strong designated verifier signature scheme with message recovery
    Li, Min
    International Journal of Hybrid Information Technology, 2015, 8 (03): : 165 - 176