Abstract
In recent years, the mobile Internet has been rapidly developed and widely used. Aiming at the problems of the weak computing power of mobile internet mobile terminal equipment, limited energy supply and high security requirements due to the complexity of mobile Internet environment, we proposes a secure and efficient server-assisted verification threshold proxy re-signature scheme, and the correctness of the program is verified. The proposed scheme includes a threshold proxy re-signature algorithm and a server-assisted authentication protocol scheme. Threshold proxy re-signature is a technique of proxy re-signature using threshold, which can decentralize the proxy’s signature rights. In the scheme, the verifier and the server send the complex signature verification operation to a semi-trusted server through the protocol, which effectively reduces the computational load of the verifier. The security analysis results show that the new scheme is safe and it is proved that the scheme is safe under collusion attack and adaptive selection message attack under the standard model. The performance analysis results show that the new scheme proposed in this paper has shorter signature length, less computational cost, higher verification efficiency and better adaptability to the mobile Internet environment.
Supported by the National Natural Science Foundation of China (Grant No. U1304614, U1204703), Henan Province Education Science Plan General Topic “Research on Trusted Degree Certification Based on Block-chain” (Grant No. (2018)-JKGHYB-0279), Zhengzhou Innovative Science and Technology Talent Team Construction Project Fund Project (Grant No. 131PCXTD597), Henan Science and Technology Project (Grant No. 162102310238).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Girault, M., Lefranc, D.: Server-aided verification: theory and practice. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 605–623. Springer, Heidelberg (2005). https://doi.org/10.1007/11593447_33
Wei, W., Yi, M., Willy, S., et al.: Provably secure server-aided verification signatures. Comput. Math. Appl. 61(7), 1705–1723 (2011)
Wu, H., Xu, C.X., Deng, J.: A server-aided aggregate verification signature scheme from bilinear pairing. In: Proceedings of INCS, China, Xi’an, pp. 503–506 (2013)
Ateniese, G., Hohenberger, S.: Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM CCS, Alexandria, USA, pp. 310–319 (2005). https://doi.org/10.1145/1102120.1102161
Shao, J., Cao, Z., Wang, L., Liang, X.: Proxy re-signature schemes without random Oracles. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 197–209. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77026-8_15
Waters, B.: Efficient identity-based encryption without random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7
Kiiate, K., Ikkwon, Y., Secogan, L.: Remark on Shao et al.’s bidirectional proxy re-signature scheme in indocrypt’07. Int. J. Netw. Secur. 9(1), 8–11 (2009). https://doi.org/10.6633/IJNS.200907.9(1).02
Libert, B., Vergnaud, D.: Multi-use unidirectional proxy re-signatures. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 511–520 (2008). https://doi.org/10.1145/1455770
Wang, W.P.: An identity-based blind proxy re-signature scheme. Comput. Appl. Softw. 29(10), 308–313 (2012). https://doi.org/10.3969/j.issn.1000
Tian, M.M.: Identity-based proxy re-signatures from lattices. Inf. Process. Lett. 115(4), 462–467 (2015). https://doi.org/10.1016/j.ipl.2014.12.002
Jiang, M.M., Hu, Y.P., Wang, B.C., et al.: Identity-based unidirectional proxy re-signature over lattice. J. Electron. Inf. Technol. 36(3), 645–649 (2014). https://doi.org/10.3724/SP.J.1146.2013.00818
Hao, S.G., Zhang, L., Muhammad, G.: A union authentication protocol of cross-domain based on bilinear pairing. J. Softw. 8(5), 1094–1100 (2013). https://doi.org/10.4304/jsw.8.5.1094-1100
Nguyen, T.C., Shen, W., Luo, Z., Lei, Z., Xu, W.: Novel data integrity verification schemes in cloud storage. In: Lee, R. (ed.) Computer and Information Science. SCI, vol. 566, pp. 115–125. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-10509-3_9
Sun, Y., Chen, X.Y., Du, X.H.: A proxy re-signature scheme for stream switching. J. Softw. 26(1), 129–144 (2015). https://doi.org/10.13328/j.cnki.jos.004553
Long, Z.H., Gong, J., Wang, B.: Energy efficiency study of clustered secure routing protocol secure communication method in wireless sensor networks. J. Electron. Inf. 37(8), 2000–2006 (2015). https://doi.org/10.11999/JEIT141284
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Long, Z.H., Gong, J., Wang, B., et al.: Energy efficiency study of secret communication method on clustering. J. Electron. Inf. Technol. 37(8), 2000–2006 (2015). https://doi.org/10.11999/JEIT141284
Bao, F., Deng, R.H., Zhu, H.F.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301–312. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39927-8_28
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Wang, Z., Lu, W.: Server-aided verification proxy re-signature. In: Proceedings of Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, pp. 1704–1707 (2013). https://doi.org/10.1109/TrustCom.2013.211.
Yang, X.D., Wang, C.F.: Flexible threshold proxy re-signature schemes. Chin. J. Electron. 20(4), 691–696 (2011)
Li, H.Y., Yang, X.D.: One-way variable threshold proxy re-signature scheme under standard model. Comput. Appl. Softw. 12, 307–310 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lei, Y., Hu, M., Gong, B., Wang, L., Cheng, Y. (2019). A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)