Skip to main content
Log in

ID-based proxy re-signature without pairing

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Proxy re-signature is a powerful cryptographic primitive, in which a proxy acts as a translator converts Alice’s signature into Bob’s signature by using the re-signature key. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the passed path proof in cloud computing. However, the number of cloud users is very huge, so it is unsuitable to construct PKI in cloud computing. Moreover, the cloud users are usually mobile devices, which are constrained with processing and power limitations, and pairing is a very costly operation to them. Thus, ID-based proxy re-signature without pairing is an attractive issue for the applications in cloud computing. In this paper, based on Chai et al’s ID-based signature from quadratic residues, we propose the first unidirectional and single-use ID-based proxy re-signature, which is existential unforgeable in the random oracle model based on the factoring assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In EUROCRYPT 1998. LNCS (Vol. 1403, pp. 127–144).

  2. Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: New definitions, algorithms, and applications. In ACM CCS 2005 (pp. 310–319).

  3. Libert, B., & Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In ACM CCS 2008 (pp. 511–520).

  4. Shao, J., Feng, M., Zhu, B., Cao, Z., & Liu, P. (2010). The security model of unidirectional proxy re-signature with private re-signature key. In ACISP 2010. LNCS (Vol. 6168, pp. 216–232).

  5. Yang, P., Cao, Z., & Dong, X. (2011). Threshold proxy re-signature. Journal of Systems Science and Complexity, 24, 816–824.

    Article  Google Scholar 

  6. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO 84, volume 196 of lecture notes in computer science (pp 47–53). Springer.

  7. Shao, J., Wei, G., Ling, Y., & Xie, M. (2011). Undirectional identity-based proxy re-signature. In Proceeding of IEEE ICC 2011 (pp. 1–5).

  8. Lauter, K., Montgomery, P. L., & Naehrig, M. (2010). An analysis of affine coordinates for pairing computation. In M. Joye, A. Miyaji, & A. Otsuka (Eds.), Pairing 2010. LNCS (Vol. 6487, pp. 1–20). Heidelberg: Springer.

  9. Chai, Zhenchuan, Cao, Zhenfu, & Dong, Xiaolei. (2007). Identity-based signature scheme based on quadratic residues. Science in China Series F: Information Sciences, 50(3), 373–380.

    Google Scholar 

  10. Shoup, V. (2005). A computational introduction to number theory and algebra (p. 534). Cambridge: Cambridge University Press.

    Book  Google Scholar 

  11. Bellare, M., & Palacio, A. (2002). GQ and Schnoor identification schemes: Proofs of security against impersonation under active and concurrent attacks. In Crypto. LNCS (Vol. 2442, pp. 162–177).

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China under Grant No.61373006,61672016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiwei Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Z., Xia, A. & He, M. ID-based proxy re-signature without pairing. Telecommun Syst 69, 217–222 (2018). https://doi.org/10.1007/s11235-018-0458-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-018-0458-9

Keywords

Navigation