One Secure Attribute-Based Proxy Signature
- 122 Downloads
Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy signer), and let proxy signer exercise such powers on his behalf. Here, a new attribute-based proxy signature with large universal attributes is proposed. The original signer delegates some of their signing rights to a proxy signer with some special attributes, then proxy signer can sign some message in the name of the original signer. We firstly give the formal syntax of an attribute-based proxy signature and the formal security model in the random oracle. The scheme is secure through detailed analysis. The scheme has the secure requirements of proxy signature system as following, distinguishability, verifiability, strong unforgeability, strong non-repudiation, strong identifiability, abuse resistance. In addition, the scheme is resistant to the collusion attack required in the attribute-based signature system.
KeywordsAttribute-based Proxy signature Original signer Proxy signer CDH problem
This work was supported partially by Henan Province Key Science-technology Research Project under Grant No. 162102210109, Henan Province Major Science-technology Project under Grant No. 131100110400-04, Science-technology Research Key Project of Henan Province Education Department under Grant No. 14B413009, and Science-technology Research Project of Zhengzhou city under Grant No. 141PPTGG431.
- 1.Shamir, A. (1984). Identity-base cryptosystems and signatures schemes. In Proceedings of the Crypto’84, LNCS 196 (pp. 47–53). Springer.Google Scholar
- 2.Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology, Eurocrypt, LNCS 3494 (pp. 457–473). Springer.Google Scholar
- 3.Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS’06 (pp. 89–98). New York: ACM Press.Google Scholar
- 4.Khader, D. (2007). Attribute based group signatures. Cryptology ePrint archive, report 2007/159. http://eprint.iacr.org/2007/159.
- 5.Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint archive, report 2008/328. http://eprint.iacr.org/2008/328.
- 6.Guo, S., & Zeng, Y. (2008). Attribute-based signature scheme. In Conference of information security and assurance (ISA2008) (pp. 509–511). Xi’an: Xi’an Electronic Science & Technology University Press.Google Scholar
- 7.Li, J., & Kim, K. (2008). Attribute-based ring signatures. Cryptology ePrint archive, report 2008/394. http://eprint.iacr.org/2008/394.
- 8.Yang, P., Cao, Z., & Dong, X. (2008). Fuzzy identity based signature. Cryptology ePrint archive, report 2008/002. http://eprint.iacr.org/2008/002.
- 10.Li, J., Au, M. H., Susilo, W., Xie, D., & Renal, K. (2010). Attribute-based signatures and its applications. In ASIACC’10 2010, Beijing, China (pp. 978–987). Copyright 2010 ACM.Google Scholar
- 14.Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures for delegating signing operation. In 3rd AC-conference on computer and communications security (CCS’96) (pp. 8–57). NewYork: AC-Press.Google Scholar
- 16.Wu, W., Mu, Y., Susilo, W. et a1. (2007). Identity-based proxy signature from pairings. In Proceedings of the 4th international conference on autonomic and trusted computing (pp. 22–31). Heidelberg: Springer.Google Scholar
- 17.Ji, H. F., Han, W. B., Zhao, L., Wang, Y. J. (2009). An identity-based proxy signature from bilinear pairings. In WASE international conference on information engineering (pp. 14–17).Google Scholar
- 19.Li, M. X., Han, B. T., Zhu, J. Y., Zheng, X. F., & Yan, P. (2009). Identity-based proxy signature scheme secure in standard model. Journal of South China University of Technology (Natural Science Edition), 37(5), 118–123.Google Scholar