Revocable identity-based proxy re-signature scheme in the standard model

User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furt...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiaodong YANG, Yutong LI, Jinli WANG, Tingchun MA, Caifen WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539341588889600
author Xiaodong YANG
Yutong LI
Jinli WANG
Tingchun MA
Caifen WANG
author_facet Xiaodong YANG
Yutong LI
Jinli WANG
Tingchun MA
Caifen WANG
author_sort Xiaodong YANG
collection DOAJ
description User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.
format Article
id doaj-art-4472a63c332c4824887bb09b5e5c26e5
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4472a63c332c4824887bb09b5e5c26e52025-01-14T07:17:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-014015316259727264Revocable identity-based proxy re-signature scheme in the standard modelXiaodong YANGYutong LIJinli WANGTingchun MACaifen WANGUser revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/identity-based proxy re-signatureuser revocationstandard modelsigning key exposurebinary tree
spellingShingle Xiaodong YANG
Yutong LI
Jinli WANG
Tingchun MA
Caifen WANG
Revocable identity-based proxy re-signature scheme in the standard model
Tongxin xuebao
identity-based proxy re-signature
user revocation
standard model
signing key exposure
binary tree
title Revocable identity-based proxy re-signature scheme in the standard model
title_full Revocable identity-based proxy re-signature scheme in the standard model
title_fullStr Revocable identity-based proxy re-signature scheme in the standard model
title_full_unstemmed Revocable identity-based proxy re-signature scheme in the standard model
title_short Revocable identity-based proxy re-signature scheme in the standard model
title_sort revocable identity based proxy re signature scheme in the standard model
topic identity-based proxy re-signature
user revocation
standard model
signing key exposure
binary tree
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/
work_keys_str_mv AT xiaodongyang revocableidentitybasedproxyresignatureschemeinthestandardmodel
AT yutongli revocableidentitybasedproxyresignatureschemeinthestandardmodel
AT jinliwang revocableidentitybasedproxyresignatureschemeinthestandardmodel
AT tingchunma revocableidentitybasedproxyresignatureschemeinthestandardmodel
AT caifenwang revocableidentitybasedproxyresignatureschemeinthestandardmodel