An improved efficient identity-based proxy signature in the standard model

ABSTRACT Many identity-based proxy signature (IBPS) schemes have been proposed, but most were proved to be secure using a random oracle model, which has attracted considerable criticism. Cao and Cao proposed an IBPS scheme using the standard model, but their scheme was shown to be insecure because it could not resist a delegator attack. In order to overcome this weakness, Gu et al. proposed a new IBPS scheme in 2013 that uses the standard model and they also provided a detailed security model for IBPS. However, in this study, we demonstrate that Gu et al.'s scheme is still vulnerable to delegator attack. In order to correct this problem, we propose an improvement of the IBPS scheme described by Gu et al. We also present an efficiency analysis for our scheme and a detailed security proof based on the computational Diffie–Hellman assumption.

[1]  Yupu Hu,et al.  New Identity-based Short Signature Without Random Oracles , 2011 .

[2]  Javier Herranz,et al.  On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.

[3]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[4]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Mihir Bellare,et al.  An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem , 2004, EUROCRYPT.

[7]  Yuh-Min Tseng,et al.  Provably secure revocable ID-based signature in the standard model , 2013, Secur. Commun. Networks.

[8]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[9]  Fengtong Wen,et al.  An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .

[10]  Fagen Li,et al.  Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model , 2013, Secur. Commun. Networks.

[11]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[12]  Weijia Jia,et al.  Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..

[13]  Harendra Singh,et al.  ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..

[14]  Yong Yu,et al.  On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[16]  Yuefei Zhu,et al.  Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.

[17]  Li Xu,et al.  Identity-Based Proxy Signature for Cloud Service in SaaS , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[18]  Dowon Hong,et al.  Identity-based proxy signature from lattices , 2013, Journal of Communications and Networks.

[19]  Zhenfu Cao,et al.  An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.

[20]  Tsz Hon Yuen,et al.  Efficient Hierarchical Identity Based Signature in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[21]  Sk Hafizul Islam,et al.  A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..

[22]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.