An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption

被引:0
|
作者
Naji, Akram A. M. [1 ]
Abu Hasan, Yahya [1 ]
机构
[1] Univ Sanis Malaysia, Sch Math Sci, George Town 11700, Malaysia
关键词
Cryptography; Proxy signature; proxy-protected signature; forward security; strong RSA assumption;
D O I
10.1109/ICCSIT.2010.5564931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature scheme is an important extension of the digital signature scheme, nowadays, is an active research topic, which attracts more researchers' attentions. As an ordinary digital signature scheme, a proxy signature is a vulnerable to the key exposure problem. In case, the secret signing key of the authorized user is be revealed or stolen. The aim of this paper is to put forth a proxy signature scheme, which has forward secrecy technique to mitigate the damage caused by the key exposure problem, which is proved secure. In this paper, the definition and security model of a forward-secure proxy signature scheme is formalized. Then, a generic forward-secure proxy-protected signature scheme is proposed based on the strong RSA assumption. By the reduction proof technique, the proposed scheme is proved secure against existential forgery adaptive chosen message attacks.
引用
收藏
页码:259 / 264
页数:6
相关论文
共 50 条
  • [1] A forward-secure blind signature scheme based on the strong RSA assumption
    Duc, DN
    Cheon, JH
    Kim, K
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 11 - 21
  • [2] A Forward-secure Threshold Signature Scheme Based on Multiplicative Secret Sharing and Strong RSA Assumption
    Lu, Dian-jun
    Wang, Yu
    Zhang, Xiao-qin
    Ji, Lan-fen
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 326 - 330
  • [3] Provably secure proxy-protected signature schemes based on RSA
    Shao, Zuhua
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) : 497 - 505
  • [4] A Strong Forward-Secure Proxy Blind Signature Scheme
    Zhang, Long
    Lu, Shuyi
    [J]. ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1391 - 1396
  • [5] An efficient proxy-protected signature scheme based on factoring
    Zhou, Y
    Cao, ZF
    Chai, ZC
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
  • [6] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [7] A Proxy-Protected Signature Scheme Based on Finite Automaton
    Cao, Fe
    Cao, Zhenfu
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
  • [8] An Efficient and Flexible Forward-Secure Signature Scheme
    Huang, Hui-Feng
    Chang, Chin -Chen
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 211 - 219
  • [9] Provably secure proxy-protected signature schemes based on factoring
    Zhou, Y
    Cao, ZF
    Lu, RX
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 164 (01) : 83 - 98
  • [10] An Improved Forward-Secure Multi-Proxy Signature Scheme
    Zhang, Jun
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 43 - 46