Xuan Hong
Department of computer science and technology, Shanghai Normal University, Shanghai, 200234, People`s Republic of China
Jianhua Gao
Department of computer science and technology, Shanghai Normal University, Shanghai, 200234, People`s Republic of China
Zhongmei Wan
College of Science, Hehai University, Nanjing 210098, China
ABSTRACT
Proxy re-signature, in which a semi-trusted proxy is given special information to convert the delegatees signature into the delegators signature on the same message, is frequently applied to many applications. Since the signing ability of the delegatee may be abused In these practical circumstances, we introduce the multiple-times proxy re-signature scheme, with the help of the binary hash tree. In this study, the proposed scheme restricted the attackers forgery, restrained the delegatees abuse and released the overhead of revocation. Furthermore, the scheme had only O(N) additional hashing computation overheads. The size of the proxy signature is also constant. Finally, we support our scheme with detailed security and performance analysis.
PDF References Citation
How to cite this article
Xuan Hong, Jianhua Gao and Zhongmei Wan, 2013. Unidirectional Multiple-times Proxy Re-signature Scheme. Information Technology Journal, 12: 4063-4067.
DOI: 10.3923/itj.2013.4063.4067
URL: https://scialert.net/abstract/?doi=itj.2013.4063.4067
DOI: 10.3923/itj.2013.4063.4067
URL: https://scialert.net/abstract/?doi=itj.2013.4063.4067
REFERENCES
- Ateniese, G. and S. Hohenberger, 2005. Proxy re-signatures: New definitions, algorithms and applications. Proceeding of the 12th ACM Conference on Computer and Communication Security, November 7-11, 2005, Alexandria, VA., USA., pp: 310-319.
CrossRef - Blaze, M., G. Bleumer and M. Strauss, 1998. Divertible protocols and atomic proxy cryptography. Proceeding of the International Conference on the Theory and Application of Cryptographic Techniques, May 31-June 4, 1998, Finland, pp: 127-177.
CrossRef - Hwang, J.Y., H.J. Kim, D.H. Lee and J. Lim, 2003. Digital signature schemes with restriction on signing capability. Proceeding of the 8th Australasian Conference of Information Security and Privacy, July 9-11, 2003, Australia, pp: 324-335.
CrossRef - Kim, K., I. Yie and S. Lim, 2009. Remark on Shao et al's bidirectional proxy re-signature scheme in indocrypt'07. Int. J. Network Security, 9: 8-11.
Direct Link - Shao, J., Z.F. Chao, L. Wang and X. Liang, 2007. Proxy re-signature schemes without random oracles. Proceeding of the 8th International Conference on Cryptology in India, December 9-13, 2007, Chennai, India, pp: 197-209.
CrossRef - Sunitha, N.R. and B.B. Amberker, 2008. Proxy re-signature schemes. Proceeding of the 4th Interna-tional Conference on Information Science and Security, December 16-20, 2008, Hyderabad, India, pp: 156-157.
CrossRef