Skip to main content
Log in

One Secure Attribute-Based Proxy Signature

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy signer), and let proxy signer exercise such powers on his behalf. Here, a new attribute-based proxy signature with large universal attributes is proposed. The original signer delegates some of their signing rights to a proxy signer with some special attributes, then proxy signer can sign some message in the name of the original signer. We firstly give the formal syntax of an attribute-based proxy signature and the formal security model in the random oracle. The scheme is secure through detailed analysis. The scheme has the secure requirements of proxy signature system as following, distinguishability, verifiability, strong unforgeability, strong non-repudiation, strong identifiability, abuse resistance. In addition, the scheme is resistant to the collusion attack required in the attribute-based signature system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir, A. (1984). Identity-base cryptosystems and signatures schemes. In Proceedings of the Crypto’84, LNCS 196 (pp. 47–53). Springer.

  2. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology, Eurocrypt, LNCS 3494 (pp. 457–473). Springer.

  3. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS’06 (pp. 89–98). New York: ACM Press.

    Google Scholar 

  4. Khader, D. (2007). Attribute based group signatures. Cryptology ePrint archive, report 2007/159. http://eprint.iacr.org/2007/159.

  5. Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint archive, report 2008/328. http://eprint.iacr.org/2008/328.

  6. Guo, S., & Zeng, Y. (2008). Attribute-based signature scheme. In Conference of information security and assurance (ISA2008) (pp. 509–511). Xi’an: Xi’an Electronic Science & Technology University Press.

  7. Li, J., & Kim, K. (2008). Attribute-based ring signatures. Cryptology ePrint archive, report 2008/394. http://eprint.iacr.org/2008/394.

  8. Yang, P., Cao, Z., & Dong, X. (2008). Fuzzy identity based signature. Cryptology ePrint archive, report 2008/002. http://eprint.iacr.org/2008/002.

  9. Shahandashti, S. F., & Safavi-Naini, R. (2009). Threshold attribute-based signatures and their application to anonymous credential systems. In AFRICACRPT’2009 (pp. 198–216). Berlin: Springer.

    Chapter  Google Scholar 

  10. Li, J., Au, M. H., Susilo, W., Xie, D., & Renal, K. (2010). Attribute-based signatures and its applications. In ASIACC’10 2010, Beijing, China (pp. 978–987). Copyright 2010 ACM.

  11. Li, J., & Kim, K. (2010). Hidden attribute-based signatures without anonymity revocation. Information Sciences: an International Journal, 180, 1681–1689.

    Article  MathSciNet  Google Scholar 

  12. Chang-xia, S. U. N., Wen-ping, M. A., & He-feng, C. H. E. N. (2010). Multi-authority attribute-based signature. Journal of Sichuan University (Engineering Science Edition), 43(1), 83–86.

    MathSciNet  Google Scholar 

  13. Sun, C. X., Ma, W. P., et al. (2012). Secure attribute-based threshold signature without a trusted central authority. Journal of Computer, 7(12), 2899–2905.

    Article  Google Scholar 

  14. Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures for delegating signing operation. In 3rd AC-conference on computer and communications security (CCS’96) (pp. 8–57). NewYork: AC-Press.

  15. Xu, J., Zhang, Z., Feng, D. (2005). ID-based proxy signature using bilinear pairings. In Proceedings of the third international symposium on parallel and distributed processing and applications (pp. 359–367). Berlin: Springer.

    Chapter  Google Scholar 

  16. Wu, W., Mu, Y., Susilo, W. et a1. (2007). Identity-based proxy signature from pairings. In Proceedings of the 4th international conference on autonomic and trusted computing (pp. 22–31). Heidelberg: Springer.

  17. Ji, H. F., Han, W. B., Zhao, L., Wang, Y. J. (2009). An identity-based proxy signature from bilinear pairings. In WASE international conference on information engineering (pp. 14–17).

  18. Chai, Zhen-chuan, Cao, Zhen-fu, & Lu, Rong-xing. (2006). An efficient provable secure id-based proxy signature scheme based on cdh assumption. Journal of Shanghai Jiaotong University (Science), 11(3), 271–278.

    MATH  Google Scholar 

  19. Li, M. X., Han, B. T., Zhu, J. Y., Zheng, X. F., & Yan, P. (2009). Identity-based proxy signature scheme secure in standard model. Journal of South China University of Technology (Natural Science Edition), 37(5), 118–123.

    Google Scholar 

  20. Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In IMA international conference (pp. 360–363).

    Chapter  Google Scholar 

Download references

Acknowledgements

This work was supported partially by Henan Province Key Science-technology Research Project under Grant No. 162102210109, Henan Province Major Science-technology Project under Grant No. 131100110400-04, Science-technology Research Key Project of Henan Province Education Department under Grant No. 14B413009, and Science-technology Research Project of Zhengzhou city under Grant No. 141PPTGG431.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanling Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, C., Guo, Y. & Li, Y. One Secure Attribute-Based Proxy Signature. Wireless Pers Commun 103, 1273–1283 (2018). https://doi.org/10.1007/s11277-018-5508-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5508-9

Keywords

Navigation