Proxy re-signature schemes without random oracles

  • Jun Shao
  • , Zhenfu Cao*
  • , Licheng Wang
  • , Xiaohui Liang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

77 Scopus citations

Abstract

To construct a suitable and secure proxy re-signature scheme is not an easy job, up to now, there exist only three schemes, one is proposed by Blaze et al. [6] at EUROCRYPT 1998, and the others are proposed by Ateniese and Hohenberger [2] at ACM CCS 2005. However, none of these schemes is proved in the standard model (i.e., do not rely on the random oracle heuristic). In this paper, based on Waters' approach [20], we first propose a multi-use bidirectional proxy re-signature scheme, denoted as Smb, which is existentially unforgeable in the standard model. And then, we extend Smb to be a multi-use bidirectional ID-based proxy re-signature scheme, denoted by S id-mb, which is also existentially unforgeable in the standard model. Both of these two proposed schemes are computationally efficient, and their security bases on the Computational Diffie-Hellman (CDH) assumption.

Original languageEnglish
Title of host publicationProgress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Proceedings
PublisherSpringer Verlag
Pages197-209
Number of pages13
ISBN (Print)9783540770251
DOIs
StatePublished - 2007
Externally publishedYes
Event8th Annual International Conference on Cryptolology in India, INDOCRYPT 2007 - Chennai, India
Duration: 9 Dec 200713 Dec 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4859 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th Annual International Conference on Cryptolology in India, INDOCRYPT 2007
Country/TerritoryIndia
CityChennai
Period9/12/0713/12/07

Keywords

  • Bilinear maps
  • Existential unforgeability
  • ID-based
  • Proxy re-signature
  • Standard model

Fingerprint

Dive into the research topics of 'Proxy re-signature schemes without random oracles'. Together they form a unique fingerprint.

Cite this