Improvement of ID-based proxy re-signature scheme with pairing-free

被引:0
|
作者
Jianhong Zhang
机构
[1] North China University of Technology,School of Information Sciences and Technology
[2] National Engineering Laboratory for Big Data Collaborative Security Technology,undefined
[3] Guangxi Key Laboratory of Cryptography and Information Security,undefined
来源
Wireless Networks | 2019年 / 25卷
关键词
Identity-based proxy re-signature; Universal forgeability; Security attack; The improved scheme;
D O I
暂无
中图分类号
学科分类号
摘要
As an all-important cryptographical technique, proxy re-signature (PRS) is broadly applied to distributed computation, copyright transfer and hidden path transfer because it permits a proxy to translate an entity’s signature into another entity’s signature on the identical message. Most existing PRS schemes make use of time-consuming pairing computation. Recently, to discard time-consuming pairing operator and complicated certificate-management, Wang et al. proposed two efficient pairing-free ID-based PRS schemes, and declared that their schemes were provably secure in the ROM. Very unluckily, in this investigation, we point out that Wang et al.’s schemes suffer from attacks of universal forgery by analyzing their security, i.e., any one can fabricate a signature on arbitrary data. After the relevant attacks are shown, the reasons which result in such attacks are analyzed. Finally, to address the above-mentioned attacks, we put forward an improved ID-based PRS scheme. The improved scheme not only preserves all advantages of Wang et al.’s scheme, but also is demonstrated to be provably secure in the ROM. Compared with the other two ID-PRS schemes, our improved ID-PRS scheme offers more advantages in respect of the overall performance and security.
引用
收藏
页码:4319 / 4329
页数:10
相关论文
共 50 条
  • [21] An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery
    James, Salome
    Thumbur, Gowri
    Reddy, P. Vasudeva
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 13 (01): : 59 - 72
  • [22] Proxy re-signature scheme for stream exchange
    School of Computer & Information Technology, Beijing Jiaotong University, Beijing
    100044, China
    不详
    450000, China
    不详
    450000, China
    Ruan Jian Xue Bao, 1 (129-144):
  • [23] Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme
    Hu, Xiaoming
    Jiang, Wenrong
    Ma, Chuang
    Yu, Chengcheng
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 12 - 16
  • [24] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    Journal of Electronics(China), 2008, (02) : 226 - 231
  • [25] Message Authentication Scheme for VANET Based on Proxy Re-Signature
    Yang, Xiaodong
    An, Faying
    Yang, Ping
    Wu, Xiaobo
    Li, Yutong
    Xiao, Likun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [26] Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
    Li Huixian
    Han Zhipeng
    Wang Liqin
    Pang Liaojun
    IEEE ACCESS, 2018, 6 : 53869 - 53881
  • [27] Another ID-Based Proxy Signature Scheme and Its Extension
    ZHANG Jianhong1
    2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security
    3. Institute of Computer Science and Technology
    Wuhan University Journal of Natural Sciences, 2007, (01) : 33 - 36
  • [28] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [29] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [30] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45