A New Revocable and Re-Delegable Proxy Signature and Its Application

被引:0
|
作者
Shengmin Xu
Guomin Yang
Yi Mu
机构
[1] University of Wollongong,Institute of Cybersecurity and Cryptology, School of Computing and Information Technology
关键词
revocation; (re)delegation; proxy signature;
D O I
暂无
中图分类号
学科分类号
摘要
With the popularity of cloud computing and mobile Apps, on-demand services such as on-line music or audio streaming and vehicle booking are widely available nowadays. In order to allow efficient delivery and management of the services, for large-scale on-demand systems, there is usually a hierarchy where the service provider can delegate its service to a top-tier (e.g., countrywide) proxy who can then further delegate the service to lower level (e.g., region-wide) proxies. Secure (re-)delegation and revocation are among the most crucial factors for such systems. In this paper, we investigate the practical solutions for achieving re-delegation and revocation utilizing proxy signature. Although proxy signature has been extensively studied in the literature, no previous solution can achieve both properties. To fill the gap, we introduce the notion of revocable and re-delegable proxy signature that supports efficient revocation and allows a proxy signer to re-delegate its signing right to other proxy signers without the interaction with the original signer. We define the formal security models for this new primitive and present an efficient scheme that can achieve all the security properties. We also present a secure on-line revocable and re-delegate vehicle ordering system (RRVOS) as one of the applications of our proposed scheme.
引用
收藏
页码:380 / 399
页数:19
相关论文
共 50 条
  • [31] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528
  • [32] The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
    Shao, Jun
    Feng, Min
    Zhu, Bin
    Cao, Zhenfu
    Liu, Peng
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 216 - +
  • [33] New proxy blind signature scheme with proxy revocation
    Information Science and Engineering Institute, Yanshan University, Qinhuangdao 066004, China
    不详
    Dianzi Yu Xinxi Xuebao, 2008, 10 (2468-2471):
  • [34] Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments
    Lin, Han-Yu
    Chen, Pei-Ru
    SENSORS, 2024, 24 (19)
  • [35] A New Transferable Digital Cash Protocol Using Proxy Re-signature Scheme
    Kavitha, M.
    Sunitha, N. R.
    Amberker, B. B.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 194 - +
  • [36] Simplified universally composable proxy re-signature
    Hong X.
    Chen K.-F.
    Wan Z.-M.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (08): : 2079 - 2088
  • [37] Proxy re-signature scheme for stream exchange
    School of Computer & Information Technology, Beijing Jiaotong University, Beijing
    100044, China
    不详
    450000, China
    不详
    450000, China
    Ruan Jian Xue Bao, 1 (129-144):
  • [38] Flexible Threshold Proxy Re-signature Schemes
    Yang Xiaodong
    Wang Caifen
    Lan Caihui
    Wang Biao
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 691 - 696
  • [39] Proxy Re-signature Supporting Conditional Delegation
    Wang, Xu An
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 844 - 848
  • [40] An Efficient Proxy Re-Signature Over Lattices
    Jiang, Mingming
    Hou, Jinqiu
    Guo, Yuyan
    Wang, Yan
    Wei, Shimin
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 145 - 160