ZHANG Yingying, ZENG Jiwen. An Efficient Proxy Ring Signature Without Bilinear Pairing[J]. Chinese Journal of Electronics, 2019, 28(3): 514-520. doi: 10.1049/cje.2019.02.002
Citation: ZHANG Yingying, ZENG Jiwen. An Efficient Proxy Ring Signature Without Bilinear Pairing[J]. Chinese Journal of Electronics, 2019, 28(3): 514-520. doi: 10.1049/cje.2019.02.002

An Efficient Proxy Ring Signature Without Bilinear Pairing

doi: 10.1049/cje.2019.02.002
Funds:  This work is is supported by This work of both authors was partially supported by Fundamental Research Funds of Chongqing University of Posts and Telecommunications (No.CQUPT:A2018-127) and the National Natural Science Foundation of China (No.11261060).
More Information
  • Corresponding author: ZENG Jiwen (corresponding author) was born in Jiangxi. He received the Ph.D. degree in Peking University. He is a professor of Xiamen University. His research interests include algebra and information security. (Email:jwzeng@xmu.edu.cn)
  • Received Date: 2017-03-20
  • Publish Date: 2019-05-10
  • Proxy ring signature is a proxy signature designed to protect the privacy of the proxy signer. In this paper, we propose a new proxy ring signature based on the Schnorr's signature. Our scheme combines the idea of the Schnorr's signature with the method of existing structure of proxy ring signature. In order to improve the performance, we eliminate the use of bilinear pairing operation. We only use the hash function in the signature verification phase. Because of above features, the proxy ring signature scheme we proposed is more efficient in computation. We also prove that our scheme is unforgeable against all kinds of adversaries in the random oracle model.
  • loading
  • C.P. Schnorr, "Efficient signature generation by smart cards", Journal of cryptology, Vol.4, No.3, pp.161-174, 1991.
    C.P. Schnorr, "Efficient identification and signatures for smart cards", Conference on the Theory and Application of Cryptology, Springer, New York, NY, pp.239-252, 1989.
    T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE transactions on information theory, Vol.41, No.4, pp.469-472, 1985.
    M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures:delegation of the power to sign messages", IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol.79, No.9, pp.1338-1354, 1996.
    M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures for delegating signing operation", Proceedings of the 3rd ACM conference on Computer and communications security, ACM, pp.48-57, 1996.
    B. Lee, H. Kim and K. Kim, "Strong proxy signature and its applications", Proceedings of SCIS, pp. 603-608, 2001.
    A.K. Awasthi and S. Lal, "ID-based ring signature and proxy ring signature schemes from bilinear pairings", arXiv preprint cs/0504097, 2005.
    W. Wu, Y. Mu, W. Susilo, et al, "Identity-based proxy signature from pairings", Autonomic and Trusted Computing, Springer Berlin Heidelberg, pp.22-31, 2007.
    A. Boldyreva, A. Palacio and B. Warinschi, "Secure proxy signature schemes for delegation of signing rights", Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
    M.S. Hwang, C.C. Lee and S.F. Tzeng, "A new proxy signature scheme for a specified group of verifiers", Information Sciences, Vol.227, pp.102-115, 2013.
    J. Zhang and Y. Yu, "Short computational Diffie-Hellmanbased proxy signature scheme in the standard model", International Journal of Communication Systems, Vol.27, No.10, pp.1894-1907, 2014.
    K. Zhang, "Threshold proxy signature schemes", International Workshop on Information Security, Springer, Berlin, Heidelberg, pp.282-290, 1997.
    J. Liu and S. Huang, "Identity-based threshold proxy signature from bilinear pairings", Informatica, Vol.21, No.1, pp.41-56, 2010.
    S. Lal and A.K. Awasthi, "Proxy blind signature scheme", Journal of Information Science and Engineering, Cryptology ePrint Archive, Report, Vol.72, 2003.
    G.K. Verma, "A proxy blind signature scheme over braid groups", IJ Network Security, Vol.9, No.3, pp.214-217, 2009.
    G. Fuchsbauer and D. Pointcheval, "Anonymous proxy signatures", International Conference on Security and Cryptography for Networks, Springer, Berlin, Heidelberg, pp.201-217, 2008.
    K.A. Ajmath, P.V. Reddy, B.U. Rao, et al, "Identity-based directed proxy ring signature scheme", Journal of Discrete Mathematical Sciences and Cryptography, Vol.15, No.(2-3), pp.181-192, 2012.
    D. Zhang, X. NIU and G. LI, "Secure and efficient anonymous proxy signature scheme in the random oracle model", The Journal of China Universities of Posts and Telecommunications, Vol.20, No.4, pp.87-92, 2013.
    X. Li, K. Chen and L. Sun, "Certificateless signature and proxy signature schemes from bilinear pairings", Lithuanian Mathematical Journal, Vol.45, No.1, pp.76-83, 2005.
    A. Boldyreva, A. Palacio and B. Warinschi, "Secure proxy signature schemes for delegation of signing rights", Journal of Cryptology, Vol.25, No.1, pp.57-115, 2012.
    D. He, Y. Chen and J. Chen, "An efficient certificateless proxy signature scheme without pairing", Mathematical and Computer Modelling, Vol.57, No.9, pp.2510-2518, 2013.
    C. Pan, S. Li, Q. Zhu, et al, "Notes on proxy signcryption and multi-proxy signature schemes", International Journal of Network Security, Vol.17, No.1, pp.29-33, 2015.
    R.A. Sahu and S. Padhye, "Provable secure identity-based multi-proxy signature scheme", International Journal of Communication Systems, Vol.28, No.3, pp.497-512, 2015.
    R.L. Rivest, A. Shamir and Y. Tauman, "How to leak a secret", International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp.552-565, 2001.
    K. Shum and V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE'02), pp.55-56, 2002.
    N.Y. Lee and M.F. Lee, "The security of a strong proxy signature scheme with proxy signer privacy protection", Applied mathematics and computation, Vol.161, No.3, pp.807-812, 2005.
    A. Yang and W. Peng, "A modified anonymous proxy signature with a trusted party", First International Workshop on Education Technology and Computer Science No.2, pp.233-236, 2009.
    Y. Yu, C. Xu, X. Huang, et al, "An efficient anonymous proxy signature scheme with provable security", Computer Standards and Interfaces, Vol.31, No.2, pp.348-353, 2009.
    J.S. Chou, "A novel anonymous proxy signature scheme", Advances in Multimedia, Vol.13, 2012.
    Shamus Software Ltd., Miracl library. http://www.shamus.ie/index.php?page=home.
    X. Cao and W. Kou, "A pairing-free identity-based authenticated key agreement scheme with minimal message", Information Sciences, Vol.180, No.15, pp.2895-2903, 2010.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (175) PDF downloads(342) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return