Revocable identity-based proxy re-signature scheme in the standard model

被引:0
|
作者
Yang X. [1 ,2 ]
Li Y. [1 ]
Wang J. [1 ]
Ma T. [1 ]
Wang C. [1 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Lanzhou
[2] State Key Laboratory of Cryptology, Beijing
来源
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Binary tree; Identity-based proxy re-signature; Signing key exposure; Standard model; User revocation;
D O I
10.11959/j.issn.1000-436x.2019072
中图分类号
学科分类号
摘要
User revocation is necessary to the practical application of identity-based proxy re-signature scheme. To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality, the notion of revocable identity-based proxy re-signature was introduced. Furthermore, the formal definition and security model of revocable identity-based proxy re-signature were presented. Based on proxy re-signature scheme and binary tree structure, a revocable identity-based proxy re-signature scheme was proposed. In the proposed, scheme, the user's signing key consists of two parts, a secret key and an update key. The secret key transmitted over the secure channel is fixed, but the update key broadcasted by the public channel is periodically changed. Only the user who has not been revoked can obtain the update key, and then randomize the secret key and update the key to generate the corresponding signature key of the current time period. In the standard model, the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks. In addition, the proposed scheme has properties of bidirectionality and multi-use, and can resist signing key exposure attacks. The analysis results show that the proposed scheme can efficiently revoke the user and update the user's key, and thus it has good scalability. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:153 / 162
页数:9
相关论文
共 26 条
  • [21] Wei J., Huang X., Hu X., Et al., Revocable threshold attribute-based signature against signing key exposure, International Conference on Information Security Practice and Experience, pp. 316-330, (2015)
  • [22] Zheng Q., Li Q., Azgin A., Et al., Data verification in information-centric networking with efficient revocable certificateless signature, IEEE Conference on Communications and Network Security, pp. 1-9, (2017)
  • [23] Hung Y.H., Tseng Y.M., Huang S.S., Lattice-based revocable certificateless signature, Symmetry, 9, 10, pp. 242-259, (2017)
  • [24] Xu S., Yang G., Mu Y., A new revocable and re-delegable proxy signature and its application, Journal of Computer Science and Technology, 33, 2, pp. 380-399, (2018)
  • [25] Wei J., Liu W., Hu X., Forward-secure identity-based signature with efficient revocation, International Journal of Computer Mathematics, 94, 7, pp. 1390-1411, (2017)
  • [26] Naor D., Naor M., Lotspiech J., Revocation and tracing schemes for stateless receivers, The 21st Annual International Cyptology Conference, pp. 41-62, (2001)