Revocable identity-based proxy re-signature scheme in the standard model
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furt...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539341588889600 |
---|---|
author | Xiaodong YANG Yutong LI Jinli WANG Tingchun MA Caifen WANG |
author_facet | Xiaodong YANG Yutong LI Jinli WANG Tingchun MA Caifen WANG |
author_sort | Xiaodong YANG |
collection | DOAJ |
description | User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability. |
format | Article |
id | doaj-art-4472a63c332c4824887bb09b5e5c26e5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-4472a63c332c4824887bb09b5e5c26e52025-01-14T07:17:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-05-014015316259727264Revocable identity-based proxy re-signature scheme in the standard modelXiaodong YANGYutong LIJinli WANGTingchun MACaifen WANGUser revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/identity-based proxy re-signatureuser revocationstandard modelsigning key exposurebinary tree |
spellingShingle | Xiaodong YANG Yutong LI Jinli WANG Tingchun MA Caifen WANG Revocable identity-based proxy re-signature scheme in the standard model Tongxin xuebao identity-based proxy re-signature user revocation standard model signing key exposure binary tree |
title | Revocable identity-based proxy re-signature scheme in the standard model |
title_full | Revocable identity-based proxy re-signature scheme in the standard model |
title_fullStr | Revocable identity-based proxy re-signature scheme in the standard model |
title_full_unstemmed | Revocable identity-based proxy re-signature scheme in the standard model |
title_short | Revocable identity-based proxy re-signature scheme in the standard model |
title_sort | revocable identity based proxy re signature scheme in the standard model |
topic | identity-based proxy re-signature user revocation standard model signing key exposure binary tree |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019072/ |
work_keys_str_mv | AT xiaodongyang revocableidentitybasedproxyresignatureschemeinthestandardmodel AT yutongli revocableidentitybasedproxyresignatureschemeinthestandardmodel AT jinliwang revocableidentitybasedproxyresignatureschemeinthestandardmodel AT tingchunma revocableidentitybasedproxyresignatureschemeinthestandardmodel AT caifenwang revocableidentitybasedproxyresignatureschemeinthestandardmodel |