Provably secure proxy signature scheme from factorization

被引:19
|
作者
Yu, Yong [1 ,2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
Sun, Ying [1 ]
Ji, Yafu [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Cryptography; Signature; Proxy signature; Integer factorization; Provable security;
D O I
10.1016/j.mcm.2011.09.040
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Proxy signature is a cryptographic primitive used for delegating the signing rights. The security of most existing proxy signature schemes is based on the complexity assumptions of discrete logarithms and the intractable problems of elliptic curves. While several proxy signature schemes from integer factorization were proposed, unfortunately they cannot resist against the attacks lunched by a malicious original signer or a malicious proxy signer. Hence, it is an interesting research problem on how to construct a provably secure proxy signature scheme based on factorization. In this paper, we propose a new construction of proxy signature whose security is reduced to the integer factorization problem in the random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational efficiency and the length of the public key. Our scheme is the first provably secure proxy signature scheme from integer factorization. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1160 / 1168
页数:9
相关论文
共 50 条
  • [21] Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
    王志伟
    郑世慧
    王励成
    杨义先
    胡正名
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 675 - 678
  • [22] A new provably secure signature scheme
    Tan, CH
    Yi, X
    Siew, CK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2633 - 2635
  • [23] A provably secure blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 171 - +
  • [24] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61
  • [25] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [26] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 55 - 67
  • [27] Provably secure certificateless digital signature scheme
    Wang, Hua-Qun
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 76 - 78
  • [28] A Provably Secure Certificateless Blind Signature Scheme
    Yang, Xiaoyuan
    Liang, Zhongyin
    Wei, Ping
    Shen, Junwei
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 643 - 646
  • [29] Provably Secure Convertible Nominative Signature Scheme
    Zhao, Wei
    Lin, Changlu
    Ye, Dingfeng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 23 - 40
  • [30] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689