A New Revocable and Re-Delegable Proxy Signature and Its Application

被引:0
|
作者
Shengmin Xu
Guomin Yang
Yi Mu
机构
[1] University of Wollongong,Institute of Cybersecurity and Cryptology, School of Computing and Information Technology
关键词
revocation; (re)delegation; proxy signature;
D O I
暂无
中图分类号
学科分类号
摘要
With the popularity of cloud computing and mobile Apps, on-demand services such as on-line music or audio streaming and vehicle booking are widely available nowadays. In order to allow efficient delivery and management of the services, for large-scale on-demand systems, there is usually a hierarchy where the service provider can delegate its service to a top-tier (e.g., countrywide) proxy who can then further delegate the service to lower level (e.g., region-wide) proxies. Secure (re-)delegation and revocation are among the most crucial factors for such systems. In this paper, we investigate the practical solutions for achieving re-delegation and revocation utilizing proxy signature. Although proxy signature has been extensively studied in the literature, no previous solution can achieve both properties. To fill the gap, we introduce the notion of revocable and re-delegable proxy signature that supports efficient revocation and allows a proxy signer to re-delegate its signing right to other proxy signers without the interaction with the original signer. We define the formal security models for this new primitive and present an efficient scheme that can achieve all the security properties. We also present a secure on-line revocable and re-delegate vehicle ordering system (RRVOS) as one of the applications of our proposed scheme.
引用
收藏
页码:380 / 399
页数:19
相关论文
共 50 条
  • [41] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [42] A new proxy blind signature scheme
    Kai Fan
    Yue Wang
    Hui Li
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2012, 3 (01) : 38 - 42
  • [43] A new proxy blind signature scheme
    School of Network Education, Beijing University of Posts and Telecommunications, Beijing 100088, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, 3 (48-52):
  • [44] Attribute-based proxy re-signature from standard lattices and its applications
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Dung Hoang Duong
    COMPUTER STANDARDS & INTERFACES, 2021, 75
  • [45] A new proxy signature scheme with revocation
    Lu, EJL
    Hwang, MS
    Huang, CH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (03) : 799 - 806
  • [46] Improvement of a new proxy signature scheme
    Guo, Gang
    Zeng, Guo-Ping
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (01): : 245 - 248
  • [47] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [48] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [49] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [50] An improvement of strong proxy signature and its applications
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 95 - +