One Attribute-Based Proxy Signature

For Identity-based proxy signature, when the original signer cannot sign for some reason,he delegate his signing capabilities to a person with an identity, in order to expand the scope of the proxy signer, an entity with a series of attribute properties can perform the right of signature. A new practical attribute-base proxy signature is devised and its security is proved equal to discrete logarithm problem and decisional bilinear Diffie-Hellman problem through using the methodology of reductionist security argument. The scheme possesses some security of strong unforgeability, strong identifiability, strong undeniability, verifiability, distinguishability, anti-collusion attack and avoids the misuse. Keywords-Attribute-based; Proxy signature; Bilinear pairings; Access structure; Collusion attack

[1]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[2]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[3]  Guo Shaniqng,et al.  Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[4]  Reihaneh Safavi-Naini,et al.  Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.

[5]  Rui Zhang,et al.  Verifiable attribute-based proxy re-encryption for secure public cloud data sharing , 2016, Secur. Commun. Networks.

[6]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[7]  Vinod Vaikuntanathan,et al.  Fuzzy Identity Based Encryption from Lattices , 2011, IACR Cryptol. ePrint Arch..

[8]  Xun Yi,et al.  An identity-based signature scheme from the Weil pairing , 2003, IEEE Communications Letters.