Identity-based proxy signatures: a generic construction and a concrete scheme from RSA

Proxy signatures allow an entity to delegate its signing capability to a proxy which can sign messages on behalf of the delegator. We examine identity-based versions of proxy signatures which employ identity strings in place of randomly generated public keys. First, we give a new generic construction of identity-based proxy signatures from identity-based standard signatures and show that our generic construction is secure if the underlying identity-based standard signature is secure. In addition, we present the first identity-based proxy signature from Rivest, Shamir and Adleman RSA, secure under the one-wayness of RSA in the random oracle model. We should highlight that the proxy key exposure attack cannot be applied to our proposed constructions. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Yuefei Zhu,et al.  Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.

[2]  Zuhua Shao,et al.  Provably secure proxy-protected signature schemes based on RSA , 2009, Comput. Electr. Eng..

[3]  Kyung-Ah Shim,et al.  An Identity-Based Proxy Signature Scheme from Pairings , 2006, ICICS.

[4]  Xiaoming Hu,et al.  Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model , 2015, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[5]  Takeshi Okamoto,et al.  Extended Proxy Signatures for Smart Cards , 1999, ISW.

[6]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[7]  Je Hong Park,et al.  Cryptanalysis of Zhou et al.'s proxy-protected signature schemes , 2005, Appl. Math. Comput..

[8]  Yuan Zhou,et al.  Provably secure proxy-protected signature schemes based on factoring , 2005, Appl. Math. Comput..

[9]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[10]  Harendra Singh,et al.  ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..

[11]  Eun-Jun Yoon,et al.  New ID-Based Proxy Signature Scheme with Message Recovery , 2013, GPC.

[12]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[13]  Yong Yu,et al.  Designated verifier proxy signature scheme without random oracles , 2009, Comput. Math. Appl..

[14]  Jianhong Zhang,et al.  Another ID-based proxy signature scheme and its extension , 2006, Wuhan University Journal of Natural Sciences.

[15]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[16]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[17]  Xavier Boyen,et al.  The Uber-Assumption Family , 2008, Pairing.

[18]  Weijia Jia,et al.  Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..

[19]  Jean-Sébastien Coron,et al.  On the Exact Security of Full Domain Hash , 2000, CRYPTO.

[20]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[21]  Hovav Shacham,et al.  Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.

[22]  Yi Mu,et al.  Identity-Based Proxy Signature from Pairings , 2007, ATC.

[23]  Mihir Bellare,et al.  Identity-Based Multi-signatures from RSA , 2007, CT-RSA.

[24]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[25]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[26]  Yi Mu,et al.  A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.

[27]  Yuefei Zhu,et al.  An Efficient ID-Based Proxy Signature Scheme from Pairings , 2007, Inscrypt.

[28]  L. Huang,et al.  Cryptanalysis of an ID-based proxy signature scheme with message recovery , 2012 .

[29]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[30]  Jean-Jacques Quisquater,et al.  A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.

[31]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[32]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[33]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[34]  He Debiao,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011 .

[35]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[36]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[37]  Javier Herranz,et al.  On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.

[38]  Zhenfu Cao,et al.  Factoring based proxy signature schemes , 2006 .

[39]  Yongjuan Wang,et al.  An Identity-Based Proxy Signature from Bilinear Pairings , 2009, 2009 WASE International Conference on Information Engineering.

[40]  Zuhua Shao,et al.  Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..