Skip to main content
Erschienen in: Cluster Computing 4/2019

02.08.2017

Universally composable secure proxy re-signature scheme with effective calculation

verfasst von: Xuan Hong, Jianhua Gao, Jianguo Pan, Bo Zhang

Erschienen in: Cluster Computing | Sonderheft 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In proxy re-signature scheme, the semi-trust proxy is given special information to convert user A’s signature into another user B’s signature on the same message m. This has numerous application, such as simplifying the certificate management by constructing a secure channel between two authentication centers, simplifying group signature management by making each signature transformed to the group’s signature, helping relieve some common key management headaches by resigning without the authentication center, and constructing digital right management (DRM) interoperable system by sharing the certification. In this paper, we proposed a novel proxy re-signature scheme with universally composable security. The proposed scheme is unidirectional, single-use, key optimal, non-transitive and non-temporary. Its security is based on Computational Diffie–Hellman assumption in the random oracle model. Furthermore, we present the universal composable based security definition of proxy re-signature, as well as the equivalent game based definition. If a scheme is proved to be safe in our game, it will have the universally composable property, which will simplify the future security analysis. Finally, we support the proposed scheme with detailed security and performance analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT1998. LNCS 1403, pp. 127–144, (1998) Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT1998. LNCS 1403, pp. 127–144, (1998)
2.
Zurück zum Zitat Blaze, M., Strauss, M.: Atomic Proxy Cryptography, Technical Reports. AT&T Research, Austin (1997) Blaze, M., Strauss, M.: Atomic Proxy Cryptography, Technical Reports. AT&T Research, Austin (1997)
3.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Network and distributed system security symposium, pp. 29–43, (2005) Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Network and distributed system security symposium, pp. 29–43, (2005)
4.
Zurück zum Zitat Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: ACM CCS 2005, pp. 310–319, (2005) Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: ACM CCS 2005, pp. 310–319, (2005)
5.
Zurück zum Zitat Taban, G., Cardenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: ACMDRM 2006, pp. 69–78, (2006) Taban, G., Cardenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: ACMDRM 2006, pp. 69–78, (2006)
6.
Zurück zum Zitat Dodis, Y., Ivan, A.: Proxy cryptography revisited. In: Network and distributed system security symposium, February (2003) Dodis, Y., Ivan, A.: Proxy cryptography revisited. In: Network and distributed system security symposium, February (2003)
7.
Zurück zum Zitat Shao, J., Chao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random oracles. In: Indocrypt 2007, LNCS 4859, pp. 197–209, (2007) Shao, J., Chao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random oracles. In: Indocrypt 2007, LNCS 4859, pp. 197–209, (2007)
8.
Zurück zum Zitat Kim, K., Yie, I., Lim, S.: Remark on Shao et al’s bidirectional proxy re-signature scheme in Indocrypt’07. Int. J. Netw. Secur. 9(1), 8–11 (2009) Kim, K., Yie, I., Lim, S.: Remark on Shao et al’s bidirectional proxy re-signature scheme in Indocrypt’07. Int. J. Netw. Secur. 9(1), 8–11 (2009)
9.
Zurück zum Zitat Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Proceedings of the 15th ACM conference on computer and communications security, (2008) Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Proceedings of the 15th ACM conference on computer and communications security, (2008)
10.
Zurück zum Zitat Chow, S., Phan, R.: Proxy re-signatures in the standard model. In: ISC 2008, LNCS 5222, pp. 260–276, (2008) Chow, S., Phan, R.: Proxy re-signatures in the standard model. In: ISC 2008, LNCS 5222, pp. 260–276, (2008)
11.
Zurück zum Zitat Chen, L., Chen, X., Sun, Y., Du, X.: A new certificate less proxy re-signature scheme in the standard model. In: 2014 Seventh international symposium on computational intelligence and design, pp. 202–206, (2014) Chen, L., Chen, X., Sun, Y., Du, X.: A new certificate less proxy re-signature scheme in the standard model. In: 2014 Seventh international symposium on computational intelligence and design, pp. 202–206, (2014)
12.
Zurück zum Zitat Hu, X., Liu, Y., Xu, H., Wang, J., Zhang, X.: Analysis and improvement of certificateless signature and proxy re-signature schemes. In: IEEE advanced information technology. Electronic and automation control conference (IAEAC) 2015, pp. 166–170, (2015) Hu, X., Liu, Y., Xu, H., Wang, J., Zhang, X.: Analysis and improvement of certificateless signature and proxy re-signature schemes. In: IEEE advanced information technology. Electronic and automation control conference (IAEAC) 2015, pp. 166–170, (2015)
13.
Zurück zum Zitat Wang X.: Proxy re-signature supporting conditional delegation. In: 10th international conference on P2P, parallel, grid, cloud and internet computing, pp. 844-848, (2015) Wang X.: Proxy re-signature supporting conditional delegation. In: 10th international conference on P2P, parallel, grid, cloud and internet computing, pp. 844-848, (2015)
14.
Zurück zum Zitat Vivek, S., Balasubramanian, G.: Controlled proxy re-signing-conditional proxy re-signatures. In: International conference on security & cryptography, (2015) Vivek, S., Balasubramanian, G.: Controlled proxy re-signing-conditional proxy re-signatures. In: International conference on security & cryptography, (2015)
15.
Zurück zum Zitat Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42th IEEE symposium on foundations of computer science, pp. 136–158, (2001) Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42th IEEE symposium on foundations of computer science, pp. 136–158, (2001)
16.
Zurück zum Zitat Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS 2007, pp. 185–194, (2007) Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM CCS 2007, pp. 185–194, (2007)
17.
Zurück zum Zitat Bellare, M., Pogaway, P.: Random oracles are practical: a paradigm from designing efficient protocols. In: ACM 1993, November, (1993) Bellare, M., Pogaway, P.: Random oracles are practical: a paradigm from designing efficient protocols. In: ACM 1993, November, (1993)
18.
Zurück zum Zitat Backes, M., Hofheinz, D.: How to break and repair a universally composable signature fucntionality. In: ISC 2004, LNCS 3225, pp. 61–72, (2004) Backes, M., Hofheinz, D.: How to break and repair a universally composable signature fucntionality. In: ISC 2004, LNCS 3225, pp. 61–72, (2004)
19.
Zurück zum Zitat Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumption. In: FoCS 2004, pp. 186–195, (2004) Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumption. In: FoCS 2004, pp. 186–195, (2004)
21.
Zurück zum Zitat Canetti, R.: Universally composable signature, certification, and authentication. In: Proceedings of the 17th computer security foundations workshop (CSFW), (2004) Canetti, R.: Universally composable signature, certification, and authentication. In: Proceedings of the 17th computer security foundations workshop (CSFW), (2004)
23.
Zurück zum Zitat Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281–308 (1988)MathSciNetCrossRef Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281–308 (1988)MathSciNetCrossRef
24.
Zurück zum Zitat Boneh, D., Franklin, M.: Identitiy-based encryption from the weil pairing. SIAM J. Comput. 32, 586–615 (2003)MathSciNetCrossRef Boneh, D., Franklin, M.: Identitiy-based encryption from the weil pairing. SIAM J. Comput. 32, 586–615 (2003)MathSciNetCrossRef
25.
Zurück zum Zitat Boneh, D., Shacham, H., Lynn, B.: Short signature from the Weil pairing. Asiacrypt 2001. 514–532 (2001) Boneh, D., Shacham, H., Lynn, B.: Short signature from the Weil pairing. Asiacrypt 2001. 514–532 (2001)
Metadaten
Titel
Universally composable secure proxy re-signature scheme with effective calculation
verfasst von
Xuan Hong
Jianhua Gao
Jianguo Pan
Bo Zhang
Publikationsdatum
02.08.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 4/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1074-2

Weitere Artikel der Sonderheft 4/2019

Cluster Computing 4/2019 Zur Ausgabe