Improvement of ID-based proxy re-signature scheme with pairing-free

被引:0
|
作者
Jianhong Zhang
机构
[1] North China University of Technology,School of Information Sciences and Technology
[2] National Engineering Laboratory for Big Data Collaborative Security Technology,undefined
[3] Guangxi Key Laboratory of Cryptography and Information Security,undefined
来源
Wireless Networks | 2019年 / 25卷
关键词
Identity-based proxy re-signature; Universal forgeability; Security attack; The improved scheme;
D O I
暂无
中图分类号
学科分类号
摘要
As an all-important cryptographical technique, proxy re-signature (PRS) is broadly applied to distributed computation, copyright transfer and hidden path transfer because it permits a proxy to translate an entity’s signature into another entity’s signature on the identical message. Most existing PRS schemes make use of time-consuming pairing computation. Recently, to discard time-consuming pairing operator and complicated certificate-management, Wang et al. proposed two efficient pairing-free ID-based PRS schemes, and declared that their schemes were provably secure in the ROM. Very unluckily, in this investigation, we point out that Wang et al.’s schemes suffer from attacks of universal forgery by analyzing their security, i.e., any one can fabricate a signature on arbitrary data. After the relevant attacks are shown, the reasons which result in such attacks are analyzed. Finally, to address the above-mentioned attacks, we put forward an improved ID-based PRS scheme. The improved scheme not only preserves all advantages of Wang et al.’s scheme, but also is demonstrated to be provably secure in the ROM. Compared with the other two ID-PRS schemes, our improved ID-PRS scheme offers more advantages in respect of the overall performance and security.
引用
收藏
页码:4319 / 4329
页数:10
相关论文
共 50 条
  • [1] Improvement of ID-based proxy re-signature scheme with pairing-free
    Zhang, Jianhong
    WIRELESS NETWORKS, 2019, 25 (07) : 4319 - 4329
  • [2] ID-based proxy re-signature without pairing
    Wang, Zhiwei
    Xia, Aidong
    He, Mingjun
    TELECOMMUNICATION SYSTEMS, 2018, 69 (02) : 217 - 222
  • [3] ID-based proxy re-signature without pairing
    Zhiwei Wang
    Aidong Xia
    Mingjun He
    Telecommunication Systems, 2018, 69 : 217 - 222
  • [4] Pairing-Free ID-Based Key-Insulated Signature Scheme
    Guo-Bin Zhu
    Hu Xiong
    Zhi-Guang Qin
    Journal of Electronic Science and Technology, 2015, 13 (01) : 33 - 38
  • [5] ID-based Proxy Re-signature with Aggregate Property
    Wang, Zhi-Wei
    Xia, Ai-Dong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (04) : 1199 - 1211
  • [6] Pairing-free ID-based key-insulated signature scheme
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
    610054, China
    J. Electron. Sci. Technol., 1 (33-38):
  • [7] Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Yuehai
    IEEE ACCESS, 2019, 7 : 37865 - 37875
  • [8] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG
    Sha, Limin
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174
  • [9] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [10] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):