Abstract
Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy signer), and let proxy signer exercise such powers on his behalf. Here, a new attribute-based proxy signature with large universal attributes is proposed. The original signer delegates some of their signing rights to a proxy signer with some special attributes, then proxy signer can sign some message in the name of the original signer. We firstly give the formal syntax of an attribute-based proxy signature and the formal security model in the random oracle. The scheme is secure through detailed analysis. The scheme has the secure requirements of proxy signature system as following, distinguishability, verifiability, strong unforgeability, strong non-repudiation, strong identifiability, abuse resistance. In addition, the scheme is resistant to the collusion attack required in the attribute-based signature system.
Similar content being viewed by others
References
Shamir, A. (1984). Identity-base cryptosystems and signatures schemes. In Proceedings of the Crypto’84, LNCS 196 (pp. 47–53). Springer.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology, Eurocrypt, LNCS 3494 (pp. 457–473). Springer.
Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS’06 (pp. 89–98). New York: ACM Press.
Khader, D. (2007). Attribute based group signatures. Cryptology ePrint archive, report 2007/159. http://eprint.iacr.org/2007/159.
Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint archive, report 2008/328. http://eprint.iacr.org/2008/328.
Guo, S., & Zeng, Y. (2008). Attribute-based signature scheme. In Conference of information security and assurance (ISA2008) (pp. 509–511). Xi’an: Xi’an Electronic Science & Technology University Press.
Li, J., & Kim, K. (2008). Attribute-based ring signatures. Cryptology ePrint archive, report 2008/394. http://eprint.iacr.org/2008/394.
Yang, P., Cao, Z., & Dong, X. (2008). Fuzzy identity based signature. Cryptology ePrint archive, report 2008/002. http://eprint.iacr.org/2008/002.
Shahandashti, S. F., & Safavi-Naini, R. (2009). Threshold attribute-based signatures and their application to anonymous credential systems. In AFRICACRPT’2009 (pp. 198–216). Berlin: Springer.
Li, J., Au, M. H., Susilo, W., Xie, D., & Renal, K. (2010). Attribute-based signatures and its applications. In ASIACC’10 2010, Beijing, China (pp. 978–987). Copyright 2010 ACM.
Li, J., & Kim, K. (2010). Hidden attribute-based signatures without anonymity revocation. Information Sciences: an International Journal, 180, 1681–1689.
Chang-xia, S. U. N., Wen-ping, M. A., & He-feng, C. H. E. N. (2010). Multi-authority attribute-based signature. Journal of Sichuan University (Engineering Science Edition), 43(1), 83–86.
Sun, C. X., Ma, W. P., et al. (2012). Secure attribute-based threshold signature without a trusted central authority. Journal of Computer, 7(12), 2899–2905.
Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures for delegating signing operation. In 3rd AC-conference on computer and communications security (CCS’96) (pp. 8–57). NewYork: AC-Press.
Xu, J., Zhang, Z., Feng, D. (2005). ID-based proxy signature using bilinear pairings. In Proceedings of the third international symposium on parallel and distributed processing and applications (pp. 359–367). Berlin: Springer.
Wu, W., Mu, Y., Susilo, W. et a1. (2007). Identity-based proxy signature from pairings. In Proceedings of the 4th international conference on autonomic and trusted computing (pp. 22–31). Heidelberg: Springer.
Ji, H. F., Han, W. B., Zhao, L., Wang, Y. J. (2009). An identity-based proxy signature from bilinear pairings. In WASE international conference on information engineering (pp. 14–17).
Chai, Zhen-chuan, Cao, Zhen-fu, & Lu, Rong-xing. (2006). An efficient provable secure id-based proxy signature scheme based on cdh assumption. Journal of Shanghai Jiaotong University (Science), 11(3), 271–278.
Li, M. X., Han, B. T., Zhu, J. Y., Zheng, X. F., & Yan, P. (2009). Identity-based proxy signature scheme secure in standard model. Journal of South China University of Technology (Natural Science Edition), 37(5), 118–123.
Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In IMA international conference (pp. 360–363).
Acknowledgements
This work was supported partially by Henan Province Key Science-technology Research Project under Grant No. 162102210109, Henan Province Major Science-technology Project under Grant No. 131100110400-04, Science-technology Research Key Project of Henan Province Education Department under Grant No. 14B413009, and Science-technology Research Project of Zhengzhou city under Grant No. 141PPTGG431.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, C., Guo, Y. & Li, Y. One Secure Attribute-Based Proxy Signature. Wireless Pers Commun 103, 1273–1283 (2018). https://doi.org/10.1007/s11277-018-5508-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-5508-9