Provably secure multi-proxy signature scheme with revocation in the standard model

Multi-proxy signature schemes are very useful tools when an original signer needs to delegate his signing capability to a group of proxy signers, and have been suggested in numerous applications. The proxy revocation problem is an essential issue of the proxy signature schemes, however, it is seldom considered in the multi-proxy signature schemes. In this paper, we give a formal definition and security model of the multi-proxy signature schemes with proxy revocation, and propose a multi-proxy signature scheme with proxy revocation. Our scheme can perform the immediate revocation by using a security mediator (SEM), who examines whether each proxy signer signs according to a warrant or its identity exists in a revocation list, and then decides if it issues a proxy token for each proxy signer. The proposed scheme is proven existentially unforgeable against chosen message/warrant attacks based on the computational Diffie-Hellman intractability assumption in the standard model. Furthermore, the size of a multi-proxy signature is constant and independent of the number of the proxy signers.

[1]  Hua Ma,et al.  Secure proxy signature scheme with fast revocation in the standard model , 2009 .

[2]  Ashutosh Saxena,et al.  An Efficient Proxy Signature Scheme with Revocation , 2004, Informatica.

[3]  Bo,et al.  Multi-Proxy Signature Without Random Oracles , 2008 .

[4]  Min-Shiang Hwang,et al.  A new proxy signature scheme with revocation , 2005, Appl. Math. Comput..

[5]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[6]  Pla Information,et al.  New Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings , 2004 .

[7]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[8]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[9]  C. F. Chong,et al.  Cryptanalysis of Harn digital multisignature scheme with distinguished signing authorities [comment] , 2000 .

[10]  Yong Yu,et al.  Improvement of a proxy multi-signature scheme without random oracles , 2011, Comput. Commun..

[11]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[12]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[13]  Yupu Hu,et al.  Secure Proxy Multi-signature Scheme in the Standard Model , 2008, ProvSec.

[14]  Yi Mu,et al.  Proxy Signature Without Random Oracles , 2006, MSN.

[15]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[16]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[17]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[18]  Gaëtan Leurent,et al.  How Risky Is the Random-Oracle Model? , 2009, CRYPTO.

[19]  Lifeng Guo,et al.  Insider attacks on multi-proxy multi-signature schemes , 2007, Comput. Electr. Eng..

[20]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[21]  Sang-Ho Lee,et al.  A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions , 2005, TrustBus.

[22]  Dan Boneh,et al.  A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.

[23]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[24]  Kefei Chen,et al.  ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings , 2005, Appl. Math. Comput..

[25]  Hung-Min Sun,et al.  Design of time-stamped proxy signatures with traceable receivers , 2000 .