A short identity-based proxy ring signature scheme from RSA

被引:11
|
作者
Asaar, Maryam Rajabzadeh [1 ]
Salmasizadeh, Mahmoud [2 ]
Susilo, Willy [2 ,3 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst Ctr, Tehran, Iran
[3] Univ Wollongong, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
Identity-based proxy ring signature; Random oracle model; RSA assumption; SECURE; POWER;
D O I
10.1016/j.csi.2014.10.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed Scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [41] Forgery attacks of an identity-based multi-proxy signature scheme
    Yap, Wun-She
    Goi, Bok-Min
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) : 283 - 289
  • [42] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [44] Identity-Based Multi-Proxy Signature Scheme in the Standard Model
    Gu, Ke
    Jia, Weijia
    Zhang, Jianming
    FUNDAMENTA INFORMATICAE, 2017, 150 (02) : 179 - 210
  • [45] A generic construction of identity-based proxy signature scheme in the standard model
    Hu X.
    Xu H.
    Wang J.
    Tan W.
    Yang Y.
    International Journal of Information and Computer Security, 2019, 11 (01) : 83 - 100
  • [46] A note on an identity-based ring signature scheme with signer verifiability
    Hwang, Jung Yeon
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (8-10) : 796 - 804
  • [47] An efficient identity-based ring signature scheme and its extension
    Zhang, Jianhong
    Computational Science and Its Applications - ICCSA 2007, Pt 2, Proceedings, 2007, 4706 : 63 - 74
  • [48] Identity-based ring signature scheme under standard model
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    Tongxin Xuebao, 2008, 4 (40-44):
  • [49] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [50] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303