A Proxy Transitive Signature Scheme

Motivated by the research of privacy protection in the graph-based big data system, we propose a new signature scheme. The properties of the constructed signature scheme are twofold. On one hand, it is consistent with the requests of the proxy signatures. Our method allows a signer to delegate his/her signing right to another user in such a way that the latter can validly sign messages on behalf of the former, and other parties (who are not designated as the proxy signer) cannot create a valid proxy signature. On the other hand, it satisfies the properties of transitive signatures. One of the fundamental but vital properties is composability, which means that given two signatures σ_ij and σ_jk on adjacent edges (i, j) and ( j,k) , anyone without knowing the signer’s secret key can easily derive the digital signature σ_ik of the edge (i,k) . This property allows the signer to authenticate a graph in a cost-saving manner. Actually, our proposed design meets all the features needed for proxy signatures and transitive signatures, and it is provably secure in the random oracle model.

[1]  Li Xu,et al.  Universal designated verifier transitive signatures for graph-based big data , 2015, Inf. Sci..

[2]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[3]  Gregory Neven A simple transitive signature scheme for directed trees , 2008, Theor. Comput. Sci..

[4]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[5]  Yi Mu,et al.  A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.

[6]  Fengtong Wen,et al.  Improvement of a forward-secure proxy signature scheme , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[7]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[8]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[9]  Susan Rae Hohenberger,et al.  The cryptographic impact of groups with infeasible inversion , 2003 .

[10]  Yi Li-jiang Proxy Multi-Signature:A New Type of Proxy Signature Schemes , 2001 .

[11]  Xiaohu Yang,et al.  Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[12]  Zheng Huang,et al.  Transitive Signature Scheme from LFSR , 2010 .

[13]  Vijay Varadharajan,et al.  An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Liu Yi-he One Controllable Proxy Signature Scheme , 2004 .

[15]  Yi Mu,et al.  An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.

[16]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[17]  Jia Xu On Directed Transitive Signature , 2009, IACR Cryptol. ePrint Arch..

[18]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[19]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[20]  Congwei Xu,et al.  A proxy blind signature scheme based on DLP , 2006, Wuhan University Journal of Natural Sciences.

[21]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[22]  Takeshi Okamoto,et al.  A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[23]  Min-Shiang Hwang,et al.  A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..

[24]  Jin Wang,et al.  Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .

[25]  Mihir Bellare,et al.  Transitive signatures: new schemes and proofs , 2005, IEEE Transactions on Information Theory.

[26]  Xun Yi Directed Transitive Signature Scheme , 2007, CT-RSA.

[27]  B. B. Amberker,et al.  Controlled Delegation in e-cheques Using Proxy Signatures , 2007, 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007).

[28]  Silvio Micali,et al.  Transitive Signature Schemes , 2002, CT-RSA.

[29]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[30]  Zhenfu Cao,et al.  Transitive Signatures from Braid Groups , 2007, INDOCRYPT.

[31]  Yi Mu,et al.  An Efficient Construction of Convertible Undeniable Proxy Signatures , 2014 .

[32]  Mihir Bellare,et al.  Transitive Signatures Based on Factoring and RSA , 2002, ASIACRYPT.

[33]  Cao Zhen-fu Present situation and progress of proxy signature , 2003 .

[34]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[35]  Zuowen Tan,et al.  Digital Proxy Blind Signature Schemes Based on DLP and ECDLP , 2002 .

[36]  Chunming Tang,et al.  A New Forward-Secure Proxy Signature Scheme , 2010, 2010 International Forum on Information Technology and Applications.

[37]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[38]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[39]  Philippe Camacho,et al.  Short Transitive Signatures for Directed Trees , 2012, CT-RSA.