Abstract
Anonymous authentication is an important means of authorizing a user without identification. It serves as a breakthrough to enhance the privacy of the user and yet preserve the security of the system. Due to limited bandwidth, permanent connections between customers and servers are unnecessary and impracticable. To ensure service availability to the customers distributed in the networks, the server must delegate his rights to other parties in the systems. In the paper, to realize anonymous authentication and delegating right, we put forth a new primitive: controllable anonymous proxy signature with revocation, by combining proxy signature, ring signature and the proposed new knowledge-proof-signauture technology. Then we give formal definitions of security and show them to be satisfiable by constructing an instantiation under RSA assumption proven secure in the random oracle model.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Cramer, R., Damgard, I., Schoenmakers, B.: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocol. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)
Hu, C., Liu, P., Li, D.: A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. In: Sebe, N., Liu, Y., Zhuang, Y.-t., Huang, T.S. (eds.) MCAM 2007. LNCS, vol. 4577, pp. 262–266. Springer, Heidelberg (2007)
Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak A Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Fuchsbauer, G., Pointcheval, D.: Anonymous Proxy Signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201–217. Springer, Heidelberg (2008)
Fujisaki, E., Okamoto, T.: Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relation. In: Džeroski, S., Lavrač, N. (eds.) ILP 1997. LNCS, vol. 1297, pp. 16–30. Springer, Heidelberg (1997)
Barić, N., Pfitzmann, B.: Collision-free Accumulators and Fail-stop Signature Schemes without Trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997)
Mambo, M., Usuda, K., Okamot, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans. Fundamentals 9, 1338–1353 (1996)
Xu, J., Zhang, Z.F., Feng, D.G.: ID-Based Proxy Signature Using Bilinear Pairings. In: Auer, P., Meir, R. (eds.) COLT 2005. LNCS (LNAI), vol. 3559, pp. 359–367. Springer, Heidelberg (2005)
Yu, Y., Xu, C., Huang, X., Mu, Y.: An Efficient Anonymous Proxy Signature with Provable Security. Computer Standards & Interface 31, 348–353 (2009)
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilin- ear Pairings and Its Application. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Shim, K.-A.: An Identity-based Proxy Signature Scheme from Pairings. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 60–71. Springer, Heidelberg (2006)
Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy Signature without Random Oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473–484. Springer, Heidelberg (2006)
Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based Proxy Signature from Pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 22–31. Springer, Heidelberg (2007)
Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure against Adaptively Chosen Message Attacks. SIAM Journal on Computing 17(2), 281–308 (1998)
Kim, H., Beak, J., Lee, B., Kim, K.: Secret Computation with Secrets for Mobile agent Using One-time Proxy Signatures. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 234–245. Springer, Heidelberg (2001)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: SCIS 2001, vol. 11B-1, pp. 603–608 (2001)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security Architecture for Computational Grids. In: ACM-CCS’98, pp. 83–92 (1998)
Park, H.-U., Lee, L.-Y.: A Digital Nominative Proxy Signature Scheme for Mobile Communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)
Gamage, C., Lei, J.W., Zheng, Y.: An Efficient Scheme for Secure Message Transmission Using Proxy-signcryption. In: ASIP99, pp. 420–431 (1999)
Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures: delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)
Pointcheval, D., Stern, J.: Security Proofs for Signature Schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)
Ballare, M., Rogaway, P.: Random Oracle Are Practical: A Paradiam for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73. ACM, New York (2007)
Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Wu, T., Wu, X.-y., Chen, Q.: An Ideal Proxy Signature Scheme with Proxy Signer Privacy Protection. Journal of Computer Research and Development 41(4), 710–714 (2004)
Shum, K., Victor, K.W.: A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection. In: WETICE’02, New York, pp. 55–56 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, J., Wang, J. (2010). A Controllable Anonymous Proxy Signature Scheme with Revocation. In: Huang, DS., Zhang, X., Reyes García, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_73
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_73
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)