Provably secure proxy signature scheme from factorization

被引:19
|
作者
Yu, Yong [1 ,2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
Sun, Ying [1 ]
Ji, Yafu [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cryptography; Signature; Proxy signature; Integer factorization; Provable security;
D O I
10.1016/j.mcm.2011.09.040
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Proxy signature is a cryptographic primitive used for delegating the signing rights. The security of most existing proxy signature schemes is based on the complexity assumptions of discrete logarithms and the intractable problems of elliptic curves. While several proxy signature schemes from integer factorization were proposed, unfortunately they cannot resist against the attacks lunched by a malicious original signer or a malicious proxy signer. Hence, it is an interesting research problem on how to construct a provably secure proxy signature scheme based on factorization. In this paper, we propose a new construction of proxy signature whose security is reduced to the integer factorization problem in the random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational efficiency and the length of the public key. Our scheme is the first provably secure proxy signature scheme from integer factorization. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1160 / 1168
页数:9
相关论文
共 50 条
  • [1] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [2] An Efficient and Provably Secure Proxy Signature Scheme
    Zhang, Jianhong
    Xu, Min
    Su, Xiuna
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS, PTS 1 AND 2, 2011, 211-212 : 876 - +
  • [3] Provably secure proxy blind signature scheme
    Kim, Young-Seol
    Chang, Jik-Hyun
    [J]. ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 998 - +
  • [4] An efficient and provably secure proxy signature scheme
    Zhang, Jianhong
    Liu, Xue
    Gao, Shengnan
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [5] A short provably secure proxy signature scheme
    Li Jin
    Wang Yanming
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04) : 721 - 724
  • [6] A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
    Wang Aiqin Li Jiguo Wang Zhijian (College of Computer & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (03) : 298 - 304
  • [7] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [8] A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
    Xiong, Hu
    Li, Fagen
    Qin, Zhiguang
    [J]. INFORMATICA, 2010, 21 (02) : 277 - 294
  • [9] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    胡国政
    洪帆
    [J]. Journal of Southwest Jiaotong University(English Edition), 2009, 17 (03) - 206
  • [10] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    Hu Guozheng
    Hong Fan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 736 - 739