A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks

Author:

Yang Wenjie1,Weng Jian2,Huang Xinyi1,Yang Anjia2

Affiliation:

1. Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China

2. College of Cyber Security/College of Information Science and Technology, Jinan University, Guangzhou 510632, China

Abstract

Abstract In certificateless proxy signature (CLPS), the key generation center is responsible for initializing the system parameters and can obtain the opportunity to adaptively set some trapdoors in them when wanting to launch some attacks. Until now, how to withstand the malicious-but-passive key generation center (MKGC) attacks in CLPS is still an interesting problem. In this paper, we focus on the challenging issue and introduce a CLPS scheme provably secure in the standard model. To the best of our knowledge, we are the first to demonstrate its security under MKGC attacks by adopting the technology of embedding the classic difficulty problems into the target entity public key rather than the system parameters during the security proof process.

Funder

National Key R&D Plan of China

National Natural Science Foundation of China

Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence

Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve

Zhuhai Top Discipline Information Security

Guangzhou Key Laboratory of Data Security and Privacy Preserving

National Joint Engineering Research Center of Network Security Detection and Protection Technology

Publisher

Oxford University Press (OUP)

Subject

General Computer Science

Reference35 articles.

1. Auditable $\sigma $-time outsourced attribute-based encryption for access control in cloud computing;Ning;IEEE Trans. Inf. Foren. Sec.,2017

2. Provably secure and lightweight certificateless signature scheme for iiot environments;Karati;IEEE Trans. Ind. Informat.,2018

3. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage;Yang;IEEE Trans. Cloud Comput.,2018

4. Proxy signature: Delegation of the power to sign messages;Mambo;IEICE Trans. Fundam. Electron. Commun. Comput. Sci.,1996

5. A digital nominative proxy signature scheme for mobile communication;Park,2001

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3