One Attribute-Based Proxy Signature

被引:0
|
作者
Sun Changxia [1 ]
Yan Yu [2 ]
Guo Yufeng [1 ]
Si Haiping [1 ]
机构
[1] Henan Agr Univ, Informat & Management Sci Coll, Dept Comp, Zhengzhou, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200030, Peoples R China
关键词
Attribute-based; Proxy signature; Bilinear pairings; Access structure; Collusion attack;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
For Identity-based proxy signature, when the original signer cannot sign for some reason, he delegate his signing capabilities to a person with an identity, in order to expand the scope of the proxy signer, an entity with a series of attribute properties can perform the right of signature. A new practical attribute-base proxy signature is devised and its security is proved equal to discrete logarithm problem and decisional bilinear Diffie-Hellman problem through using the methodology of reductionist security argument. The scheme possesses some security of strong unforgeability, strong identifiability, strong undeniability, verifiability, distinguishability, anti-collusion attack and avoids the misuse.
引用
收藏
页码:1235 / 1239
页数:5
相关论文
共 50 条
  • [11] Traceable attribute-based signature
    Gu, Ke
    Wang, Keming
    Yang, Lulu
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [12] Registered Attribute-Based Signature
    Zhang, Yijian
    Zhao, Jun
    Zhu, Ziqi
    Gong, Junqing
    Chen, Jie
    PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 133 - 162
  • [13] Attribute-based signature on lattices
    Mao X.-P.
    Chen K.-F.
    Long Y.
    Wang L.-L.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 406 - 411
  • [14] Attribute-Based Signature on Lattices
    毛贤平
    陈克非
    龙宇
    王亮亮
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 406 - 411
  • [15] Attribute-based proxy re-signature from standard lattices and its applications
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Dung Hoang Duong
    COMPUTER STANDARDS & INTERFACES, 2021, 75
  • [16] Attribute-Based Proxy Signature Scheme Supporting Flexible Threshold Predicate for UAV Networks
    He, Lei
    Gan, Yong
    Zhang, Yanhua
    ELECTRONICS, 2023, 12 (23)
  • [17] Attribute-based Message Recovery Designated Verifier Proxy Signature Scheme in Telemedicine System
    Hu, Yu
    Zhang, Yi-Fan
    Huang, Hui
    Zhou, Yu-Ping
    Journal of Network Intelligence, 2022, 7 (01): : 101 - 113
  • [18] Efficient Traceable Attribute-Based Signature
    Ding, Shenglong
    Zhao, Yiming
    Liu, Yuyang
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 582 - 589
  • [19] On the Security of an Attribute-Based Signature Scheme
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Goi, Bok-Min
    U- AND E-SERVICE, SCIENCE AND TECHNOLOGY, 2009, 62 : 161 - +
  • [20] Attribute-based signature schemes with accountability
    Ren, Yan
    Tang, Chunming
    Wang, Guilin
    Wong, DuncaN. S.
    International Journal of Information and Communication Technology, 2015, 7 (2-3) : 141 - 158