Provably secure proxy signature scheme from factorization

被引:19
|
作者
Yu, Yong [1 ,2 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
Sun, Ying [1 ]
Ji, Yafu [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cryptography; Signature; Proxy signature; Integer factorization; Provable security;
D O I
10.1016/j.mcm.2011.09.040
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Proxy signature is a cryptographic primitive used for delegating the signing rights. The security of most existing proxy signature schemes is based on the complexity assumptions of discrete logarithms and the intractable problems of elliptic curves. While several proxy signature schemes from integer factorization were proposed, unfortunately they cannot resist against the attacks lunched by a malicious original signer or a malicious proxy signer. Hence, it is an interesting research problem on how to construct a provably secure proxy signature scheme based on factorization. In this paper, we propose a new construction of proxy signature whose security is reduced to the integer factorization problem in the random oracle model. We demonstrate that our scheme outperforms the other existing schemes in terms of security, computational efficiency and the length of the public key. Our scheme is the first provably secure proxy signature scheme from integer factorization. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1160 / 1168
页数:9
相关论文
共 50 条
  • [31] A Provably Secure ID-based Designated Verifier Proxy Signature Scheme Based on DLP
    Wei, Baodian
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 721 - 724
  • [32] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [33] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [34] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [35] Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare
    Verma, Girraj Kumar
    Singh, B. B.
    Singh, Harendra
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (01) : 539 - 554
  • [36] Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare
    Girraj Kumar Verma
    B. B. Singh
    Harendra Singh
    [J]. Wireless Personal Communications, 2018, 99 : 539 - 554
  • [37] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [38] A new provably secure certificateless short signature scheme
    Choi, Kyu Young
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) : 1760 - 1768
  • [39] Study on a Provably Secure Certificateless Aggregate Signature Scheme
    Liu, Yan
    Hu, Xiaoming
    Tan, Wenan
    [J]. 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL (ICNSC), 2016,
  • [40] Study on a Provably Secure Certificateless Aggregate Signature Scheme
    Liu, Yan
    Hu, XiaoMing
    Tan, Wenan
    [J]. 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL (ICNSC), 2016,