Proxy re-signature has the function of converting signature, and has extensive application prospects, such as cloud storage, data exchange, cross-domain identity authentication and so on. However, most proxy re-signature schemes require expensive bilinear pairing operations, which are not suitable for low-power devices. To improve the performance of proxy re-signature schemes, the security model of a bidirectional sever-aided verification proxy re-signature is presented. Furthermore, a sever-aided verification proxy re-signature scheme is proposed. This scheme is proven to be secure under collusion attacks and adaptive chosen message attacks in the standard model. Analysis results show that the proposed scheme effectively reduces the computation cost of pairing operation, and it greatly reduces computational complexity of signature verification algorithm. The proposed scheme is more efficient than the existing proxy re-signature schemes.
杨小东,李亚楠,高国娟,王彩芬,鲁小勇. 标准模型下的服务器辅助验证代理重签名方案[J]. 电子与信息学报, 2016, 38(5): 1151-1157.
YANG Xiaodong, LI Yanan, GAO Guojuan, WANG Caifen, LU Xiaoyong. Sever-aided Verification Proxy Re-signature Scheme in the Standard Model. JEIT, 2016, 38(5): 1151-1157.
BLAZE M, BLEUMER G, and STRAUSS M. Divertible protocols and atomic proxy cryptography[C]. Proceedings of EUROCRYPT’98, Helsinki, Finland, 1998: 127-144. doi: 10.1.1.81.8246.
[2]
HAO S G, ZHANG L, and MUHAMMAD G. A union authentication protocol of cross-domain based on bilinear pairing[J]. Journal of Software, 2013, 8(5): 1094-1100. doi: 10.4304/jsw.8.5.1094-1100.
[3]
NGUYEN T C, SHEN W, LUO Z, et al. Novel Data Integrity Verification Schemes in Cloud Storage[M]. Switzerland: Springer International Publishing, 2015: 115-125. doi: 10.1007/BFb0054122.
SUN Yi, CHEN X Y, DU X H, et al. Proxy re-signature scheme for stream exchange[J]. Journal of Software, 2015, 26(1): 129-144. doi: 10.13328/j.cnki.jos.004553.
[5]
ATENIESE G and HOHENBERGER S. Proxy re-signatures: new definitions, algorithms, and applications[C]. Proceedings of the 12th ACM CCS, Alexandria, USA, 2005: 310-319. doi: 10.1145/1102120.1102161.
[6]
SHAO J, CAO Z, WANG L, et al. Proxy re-signature schemes without random oracles[C]. Proceedings of INDO-CRYPT 2007, Chennai, India, 2007: 197-209. doi: 10.1007/ 978-3-540-77026-8_15.
[7]
WATERS B. Efficient identity-based encryption without random oracles[C]. Proceedings of EuroCrypt 2005, Aarhus, 2005: 114-127. doi: 10.1007/11426639_7.
[8]
KiIATE K, IKKWON Y, and SECOGAN L. Remark on shao et al’s bidirectional proxy re-signature scheme in indocrypt’07[J]. International Journal of Network Security, 2009, 8(3): 308-311. doi: 10.4304/jcp.7.7.1796-1800.
[9]
LIBERT B and VERGNAUD D. Multi-use unidirectional proxy re-signatures[C]. Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, USA, 2008: 511-520. doi: 10.1145/1455770. 1455835.
[10]
WANG W P. An identity-based blind proxy re-signature scheme[J]. Computer Applications and Software, 2012, 29(10): 308-313. doi: 10.3969/j.issn.1000.
[11]
YANG X, LI C, LI Y, et al. Divisible on-line/off-line proxy re-signature[J]. Applied Mathematics & Information Sciences, 2015, 9(2): 759-767. doi: 10.1007/978-3-642-00862-7_10.
[12]
YANG X, WANG C, ZHANG L, et al. On-line/off-line threshold proxy re-signatures[J]. Chinese Journal of Electronics, 2014, 23(2): 248-253. doi: 10.4156/jcit.vol7. issue23.7.
[13]
TIAN M M. Identity-based proxy re-signatures from lattices [J]. Information Processing Letters, 2015, 115(4): 462-467. doi: 10.1016/j.ipl.2014.12.002.
JIANG M M, HU Y P, WANG B C, et al. Identity-based unidirectional proxy re-signature over lattice[J]. Journal of Electronics & Information Technology, 2014, 36(3): 645-649. doi: 10.3724/SP.J.1146.2013. 00818.
LONG Z H, GONG J, WANG B, et al. Energy efficiency study of secret communication method on clustering[J]. Journal of Electronics & Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284.
[16]
WANG Z and W. Server-aided verification proxy re-signature[C]. Proceedings of Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 2013: 1704-1707. doi: 10.1109/TrustCom.2013.211.
[17]
CANETTI R, GOLDREICH O, and HALEVI S. The random oracle methodology, revisited[J]. Journal of the ACM, 2004, 51(4): 557-594. doi: 10.1145/1008731.1008734.
[18]
WU W, MU Y, SUSILO W, et al. Server-aided verification signatures: definitions and new constructions[C]. Proceedings of Provable Security, Shanghai, China, 2008: 141-155. doi: 10.1007/978-3-540-88733-1_10.
[19]
WANG Zh W, WANG L Ch , YANG Y X, et al. Comment on Wu et al.’s server-aided verification signature schemes[J]. International Journal of Network Security, 2010, 10(2): 158-160. doi: 10.1.1.592.231.