Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

In recent years, the mobile Internet has been rapidly developed and widely used. Aiming at the problems of the weak computing power of mobile internet mobile terminal equipment, limited energy supply and high security requirements due to the complexity of mobile Internet environment, we proposes a secure and efficient server-assisted verification threshold proxy re-signature scheme, and the correctness of the program is verified. The proposed scheme includes a threshold proxy re-signature algorithm and a server-assisted authentication protocol scheme. Threshold proxy re-signature is a technique of proxy re-signature using threshold, which can decentralize the proxy’s signature rights. In the scheme, the verifier and the server send the complex signature verification operation to a semi-trusted server through the protocol, which effectively reduces the computational load of the verifier. The security analysis results show that the new scheme is safe and it is proved that the scheme is safe under collusion attack and adaptive selection message attack under the standard model. The performance analysis results show that the new scheme proposed in this paper has shorter signature length, less computational cost, higher verification efficiency and better adaptability to the mobile Internet environment.

Supported by the National Natural Science Foundation of China (Grant No. U1304614, U1204703), Henan Province Education Science Plan General Topic “Research on Trusted Degree Certification Based on Block-chain” (Grant No. (2018)-JKGHYB-0279), Zhengzhou Innovative Science and Technology Talent Team Construction Project Fund Project (Grant No. 131PCXTD597), Henan Science and Technology Project (Grant No. 162102310238).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Girault, M., Lefranc, D.: Server-aided verification: theory and practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 605–623. Springer, Heidelberg (2005). https://doi.org/10.1007/11593447_33

    Chapter  Google Scholar 

  2. Wei, W., Yi, M., Willy, S., et al.: Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7), 1705–1723 (2011)

    Article  Google Scholar 

  3. Wu, H., Xu, C.X., Deng, J.: A server-aided aggregate verification signature scheme from bilinear pairing. In: Proceedings of INCS, China, Xi’an, pp. 503–506 (2013)

    Google Scholar 

  4. Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM CCS, Alexandria, USA, pp. 310–319 (2005). https://doi.org/10.1145/1102120.1102161

  5. Shao, J., Cao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random Oracles. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 197–209. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77026-8_15

    Chapter  Google Scholar 

  6. Waters, B.: Efficient identity-based encryption without random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7

    Chapter  Google Scholar 

  7. Kiiate, K., Ikkwon, Y., Secogan, L.: Remark on Shao et al.’s bidirectional proxy re-signature scheme in indocrypt’07. Int. J. Netw. Secur. 9(1), 8–11 (2009). https://doi.org/10.6633/IJNS.200907.9(1).02

    Article  Google Scholar 

  8. Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 511–520 (2008). https://doi.org/10.1145/1455770

  9. Wang, W.P.: An identity-based blind proxy re-signature scheme. Comput. Appl. Softw. 29(10), 308–313 (2012). https://doi.org/10.3969/j.issn.1000

    Article  Google Scholar 

  10. Tian, M.M.: Identity-based proxy re-signatures from lattices. Inf. Process. Lett. 115(4), 462–467 (2015). https://doi.org/10.1016/j.ipl.2014.12.002

    Article  MathSciNet  MATH  Google Scholar 

  11. Jiang, M.M., Hu, Y.P., Wang, B.C., et al.: Identity-based unidirectional proxy re-signature over lattice. J. Electron. Inf. Technol. 36(3), 645–649 (2014). https://doi.org/10.3724/SP.J.1146.2013.00818

    Article  Google Scholar 

  12. Hao, S.G., Zhang, L., Muhammad, G.: A union authentication protocol of cross-domain based on bilinear pairing. J. Softw. 8(5), 1094–1100 (2013). https://doi.org/10.4304/jsw.8.5.1094-1100

    Article  Google Scholar 

  13. Nguyen, T.C., Shen, W., Luo, Z., Lei, Z., Xu, W.: Novel data integrity verification schemes in cloud storage. In: Lee, R. (ed.) Computer and Information Science. SCI, vol. 566, pp. 115–125. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-10509-3_9

    Chapter  Google Scholar 

  14. Sun, Y., Chen, X.Y., Du, X.H.: A proxy re-signature scheme for stream switching. J. Softw. 26(1), 129–144 (2015). https://doi.org/10.13328/j.cnki.jos.004553

    Article  MathSciNet  Google Scholar 

  15. Long, Z.H., Gong, J., Wang, B.: Energy efficiency study of clustered secure routing protocol secure communication method in wireless sensor networks. J. Electron. Inf. 37(8), 2000–2006 (2015). https://doi.org/10.11999/JEIT141284

    Article  Google Scholar 

  16. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  17. Long, Z.H., Gong, J., Wang, B., et al.: Energy efficiency study of secret communication method on clustering. J. Electron. Inf. Technol. 37(8), 2000–2006 (2015). https://doi.org/10.11999/JEIT141284

    Article  Google Scholar 

  18. Bao, F., Deng, R.H., Zhu, H.F.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301–312. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39927-8_28

    Chapter  Google Scholar 

  19. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  20. Wang, Z., Lu, W.: Server-aided verification proxy re-signature. In: Proceedings of Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, pp. 1704–1707 (2013). https://doi.org/10.1109/TrustCom.2013.211.

  21. Yang, X.D., Wang, C.F.: Flexible threshold proxy re-signature schemes. Chin. J. Electron. 20(4), 691–696 (2011)

    Google Scholar 

  22. Li, H.Y., Yang, X.D.: One-way variable threshold proxy re-signature scheme under standard model. Comput. Appl. Softw. 12, 307–310 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingsheng Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lei, Y., Hu, M., Gong, B., Wang, L., Cheng, Y. (2019). A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics