Abstract
Aiming at the problems of limited computing power and high security requirements of mobile Internet mobile terminal devices, we propose a server-assisted verification partial blind proxy re-signature scheme. Partial blind proxy re-signature algorithm protects both the trustee’s privacy message and the agent’s legal rights. In the server-assisted authentication protocol, the verifier transfers the complex bilinear pairing operation task to the server through the interaction, thereby reducing the amount of computation of the verifier. The numerical experiments show that the verification efficiency of the new scheme is improved by at least 71% and 74%, respectively, compared with the Yang’s and Feng’s schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wei, W., Yi, M., Susilo, W., et al.: Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7), 1705–1723 (2011)
Niu, S.F., Wang, C.F., et al.: Server-assisted verification signature scheme against collusion attacks. Appl. Res. Comput. 33(1), 229–231 (2016)
Yang, X.D., Li, Y.N., Zhou, Q.X., et al.: Security analysis and improvement of a server-sided authentication aggregation signature scheme. Comput. Eng. 43(1), 183–187 (2017)
Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. https://doi.org/10.1145/1102120.1102161
Hong, X., Chen, K.F., Wan, Z.M.: Simple universally combinable proxy re-signature scheme. J. Softw. 21(8), 2079–2088 (2010)
Ai, H., Liu, X.J.: Research on universal combinable re-signature scheme based on bilinear pairs. Comput. Eng. Des. 34(11), 3748–3751 (2013)
Li, H.X., Shao, L., Pang, L.J.: Proxy re-signature scheme based on polynomial isomorphism. J. Commun. 38(2), 16–24 (2017)
Qiao, L.: Research on Lattice-Based Proxy Signature Scheme, pp. 40–46. University of Electronic Science and Technology of China, Chengdu (2016)
Huang, P., Yang, X.D., Li, Y., et al.: Identity-based proxy re-signature scheme for unpaired linear pairs. Comput. Appl. 35(6), 1678–1682 (2015)
Yang, X.D., Yang, P., Gao, G.J., et al.: Uncertified proxy re-signature scheme with aggregation properties. Comput. Eng. Sci. 40(6), 71–76 (2018)
Mi, J.L., Zhang, J.Z., Chen, S.T., et al.: Blind proxy signature scheme for designated verifiers that can tolerate information disclosure. Comput. Eng. Appl. 52(22), 123–126 (2016)
Yang, X.D., Chen, C.L., Yang, P., et al.: Partially blind proxy re-signature scheme. J. Commun. 39(2), 67–72 (2018)
Yang, X.D., Li, Y.N., Gao, G.J., et al.: Sever-aided verification proxy re-signature scheme in the standard model. J. Electron. Inf. Technol. 38(5), 1151–1157 (2016)
Feng, T., Liang, Y.X.: Proven secure certificateless blind proxy re-signature. J. Commun. 33(Z1), 58–78 (2012)
Hu, X.M., Yang, Y.C., Liu, Y.: Security analysis and improvement of a blind proxy re-signature scheme based on standard model. Small Microcomput. Syst. 2(10), 2008–2011 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lei, Y., Jia, Z., Wang, L., Gong, B., Cheng, Y., Fu, J. (2020). Partial Blind Proxy Re-signature Scheme for Mobile Internet. In: Han, W., Zhu, L., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2019. Communications in Computer and Information Science, vol 1149. Springer, Singapore. https://doi.org/10.1007/978-981-15-3418-8_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-3418-8_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3417-1
Online ISBN: 978-981-15-3418-8
eBook Packages: Computer ScienceComputer Science (R0)