A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random Oracles

In a designated verifier proxy signature scheme, proxy signature is issued for a designated receiver and only he/she can validate the signature. The fast revocation of delegated rights is an essential issue of the proxy signature schemes. In this paper, we present a designated verifier proxy signature scheme with fast revocation that has provable security in the standard model. In the our proposed scheme, we use of an on-line partially trusted server named SEM and the SEM should check whether a proxy signer signs according to the warrant or he/she exists in the revocation list. Additionally, the proxy signer must cooperate with the SEM to produce a valid proxy signature. We also propose the provable security of our scheme is based on the Gap Bilinear Diffie- Hellman (GBDH) intractability assumption and we will show that the proposed scheme satisfies all the security requirements for a proxy signature.

[1]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[2]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[3]  Xiaohu Yang,et al.  Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[4]  Hung-Min Sun,et al.  Design of time-stamped proxy signatures with traceable receivers , 2000 .

[5]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[6]  Ueli Maurer,et al.  Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.

[7]  Bo,et al.  Multi-Proxy Signature Without Random Oracles , 2008 .

[8]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[9]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[10]  Yong Yu,et al.  Designated verifier proxy signature scheme without random oracles , 2009, Comput. Math. Appl..

[11]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[12]  Xiaolei Dong,et al.  Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[13]  Sang-Ho Lee,et al.  A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions , 2005, TrustBus.

[14]  Yi Mu,et al.  Short Designated Verifier Proxy Signature from Pairings , 2005, EUC Workshops.

[15]  Laurence T. Yang,et al.  Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings , 2005, EUC Workshops.

[16]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.