• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
Citation: Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197

Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model

More Information
  • Published Date: July 31, 2016
  • Multi-proxy signature schemes are quite useful tools while a signer requires delegating his signing right to a group of proxy signers. There are two main types of formal security models of multi-proxy signatures. However, they have deficiencies, respectively. One of them is complicated, and does not model the chosen warrant attacks; the other model does have the incomplete definition of adversary. Meanwhile, there is so far no provably secure identity-based multi-proxy signature scheme. In this paper, we give a formal security model of the identity-based multi-proxy signature schemes, and propose an identity-based multi-proxy signature scheme. Our security model compensates for deficiencies in existing models. It defines more powerful adversary capacity, formalizes the behaviors of the adversaries, and adopts simple and clear proof structure. The proposed identity-based multi-proxy signature scheme is based on the well-studied CDH (computational Diffie-Hellman) assumption, and is proven existentially unforgeable against chosen message/warrant attacks in our security model. In addition, we present that there are three security flaws in a recent proposed identity-based multi-proxy signature scheme and in its security model. Comparative analysis shows that the new security model is more complete, and the new multi-proxy signature scheme is a real and provably secure identity-based cryptosystem in the standard model.
  • Related Articles

    [1]Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen. Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264. DOI: 10.7544/issn1000-1239.2021.20210669
    [2]Chen Ming. Strongly Secure Anonymous Implicit Authentication and Key Agreement for Roaming Service[J]. Journal of Computer Research and Development, 2017, 54(12): 2772-2784. DOI: 10.7544/issn1000-1239.2017.20160485
    [3]Zhang Minqing, Du Weidong, Yang Xiaoyuan, HanYiliang. A Fully Secure KP-ABE Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2015, 52(8): 1893-1901. DOI: 10.7544/issn1000-1239.2015.20140605
    [4]Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    [5]Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng. Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
    [6]Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.
    [7]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [8]Pan Jiaxin and Wang Libin. A Modular Approach Towards Design and Analysis of Authenticated Key Exchange Protocol Based on Extended Canetti-Krawczyk Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1390-1399.
    [9]Wu Qing, Zhang Leyou, Hu Yupu. A New Construction of Short Hierarchical Identity-Based Signature in the Standard Model[J]. Journal of Computer Research and Development, 2011, 48(8): 1357-1362.
    [10]Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi. Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Computer Research and Development, 2010, 47(9): 1604-1610.

Catalog

    Article views (1091) PDF downloads (502) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return