Journal on Communications ›› 2017, Vol. 38 ›› Issue (2): 16-24.doi: 10.11959/j.issn.1000-436x.2017024

• Papers • Previous Articles     Next Articles

Proxy re-signature scheme based on isomorphisms of polynomial

Hui-xian LI1,Lu SHAO1,Liao-jun PANG2   

  1. 1 School of Computer Science and Engineering,Northwestern Polytechnical University,Xi'an 710072,China
    2 State Key Laboratory of Integrated Services Networks,Xidian University,Xi'an 710071,China
  • Revised:2016-12-27 Online:2017-02-01 Published:2017-07-20
  • Supported by:
    The National Natural Science Foundation of China(61103178);The National Natural Science Foundation of China(61473214);The Natural Science Basic Research Plan in Shaanxi Province of China(2015JM6294);The Natural Science Basic Research Plan in Shaanxi Province of China(2016JM6002);The Natural Science Basic Research Plan in Shaanxi Province of China(2015JM6294);The Fundamental Research Funds for the Central Universities(3102015JSJ0003)

Abstract:

Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.

Key words: proxy re-signature, multivariate public key cryptosystem, isomorphisms of polynomial, affine transformation

CLC Number: 

No Suggested Reading articles found!