Revocable identity-based designated verifier proxy re-signature with signature evolution

被引:0
|
作者
Zhang, Qiu [1 ]
Sun, Yinxia [1 ]
Lu, Yang [1 ]
Huang, Wensheng [2 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Elect Informat, Nanjing 210023, Peoples R China
[2] Nanjing Open Univ, Sch Intelligent Engn, Nanjing 211200, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-signature; User revocation; Signature evolution; Designated verifier; EFFICIENT; SCHEME;
D O I
10.1016/j.csi.2024.103894
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy re-signature (IDPRS) enables a semi-trusted proxy to convert one user's signature to another user's for the same message without revealing any secret information of both users' signing keys. In IDPRS, user revocation is a necessary problem arising from privilege expiry or private key compromise. A revoked user cannot produce new signatures including re-signatures from the proxy. There is a need for some applications like a contract management system to keep expired message and signature pairs valid in the next period. The conventional solution is to require the unrevoked users to sign these messages again, which burdens users heavily. Therefore, establishing an IDPRS system with revocation and efficient signature updating is crucial. This paper introduces the concept of revocable IDPRS with signature evolution, facilitating efficient signature updating. The signature evolution enables the proxy to batch update non-revoked users' signatures from old ones to new ones, while also offering precise execution of signature updates on specific messages. Moreover, to further protect the privacy of signature validity, we employ designated verifier in our scheme. Formal security proofs are provided, and performance evaluation demonstrates our scheme's lower computation costs for signature updating and its comprehensive security attributes.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Identity based strong designated verifier signature scheme
    Kancharla, Phani Kumar
    Gummadidala, Shailaja
    INFORMATICA, 2007, 18 (02) : 239 - 252
  • [42] A Certificateiess Proxy Re-Signature Scheme
    Guo Duntao
    Wei Ping
    Yu Dan
    Yang Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 157 - 161
  • [43] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [44] Identity-based threshold signature and mediated proxy signature schemes
    YU Yong YANG Bo State Key Laboratory of ISN
    The Journal of China Universities of Posts and Telecommunications, 2007, (02) : 69 - 74
  • [45] A New Designated Verifier Proxy Signature in Standard Model
    Guo, Li-Hong
    Wu, Hai-Tao
    Yang, Qing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 148 - 151
  • [46] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [47] Short designated verifier proxy signature from pairings
    Huang, XY
    Mu, Y
    Susilo, W
    Zhang, FT
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 835 - 844
  • [48] Proxy re-signature scheme based on quadratic residues
    Yuqiao D.
    Ge S.
    Journal of Networks, 2011, 6 (10) : 1459 - 1465
  • [49] Attacks on One Designated Verifier Proxy Signature Scheme
    Kang, Baoyuan
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [50] An improved designated-verifier proxy signature scheme
    Zhang, Jianhong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 77 - 82