On provably secure code-based multiple grade proxy signature scheme

In multiple grade proxy signatures, the signing right can be delegated from one grade to the next grade. In this paper, we first introduce a code-based multiple grade proxy signatures based on Stern's identification scheme. The proposed scheme is the first code-based multiple grade proxy signature. Our scheme is secure on the syndrome decoding problem and satisfies verifiability, unforgeability, undeniability, non-transferability and distinguishability properties, which are the security requirements for a multiple grade proxy signature.

[1]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[2]  Robert H. Deng,et al.  Security Analysis of Some Proxy Signatures , 2003, ICISC.

[3]  Andrew S. Tanenbaum,et al.  Disallowing Unauthorized State Changes of Distributed Shared Objects , 2000, SEC.

[4]  Matthieu Finiasz,et al.  How to Achieve a McEliece-Based Digital Signature Scheme , 2001, ASIACRYPT.

[5]  Yi Mu,et al.  An efficient anonymous proxy signature scheme with provable security , 2009, Comput. Stand. Interfaces.

[6]  Tsz Hon Yuen,et al.  Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant , 2006, 2006 International Conference on Computational Intelligence and Security.

[7]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[8]  Andrew S. Tanenbaum,et al.  A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.

[9]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[10]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[11]  Jacques Stern,et al.  A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.

[12]  Pierre-Louis Cayrel,et al.  A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2008, IEEE Transactions on Information Theory.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Ru Peng A Multiple Grade Proxy Signature Scheme Based on Strong Key-insulated Scheme , 2007 .

[15]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[16]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[17]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[18]  Fagen Li,et al.  A Certificateless Proxy Ring Signature Scheme with Provable Security , 2011, Int. J. Netw. Secur..

[19]  Abolfazl Falahati,et al.  A Proxy Signature Scheme Based on Coding Theory , 2010, ICGS3.

[20]  Jin Li,et al.  Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..

[21]  XU Qiu-liang A new efficient hierarchy of proxy authorization , 2008 .

[22]  Ammar Bouallegue,et al.  Secure and Fast Digital Signatures using BCH Codes , 2006 .

[23]  Jianfeng Ma,et al.  Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption , 2013, ESORICS.

[24]  Ed Dawson,et al.  Identity-based strong designated verifier signature schemes: Attacks and new construction , 2009, Comput. Electr. Eng..

[25]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[26]  Joonsang Baek,et al.  Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .

[27]  Zhenfu Cao,et al.  A secure identity-based proxy multi-signature scheme , 2009, Inf. Sci..