Journal on Communications ›› 2019, Vol. 40 ›› Issue (5): 153-162.doi: 10.11959/j.issn.1000-436x.2019072

• Papers • Previous Articles     Next Articles

Revocable identity-based proxy re-signature scheme in the standard model

Xiaodong YANG1,2,Yutong LI1,Jinli WANG1,Tingchun MA1,Caifen WANG1   

  1. 1 College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China
    2 State Key Laboratory of Cryptology,Beijing 100878,China
  • Revised:2018-08-16 Online:2019-05-25 Published:2019-05-30
  • Supported by:
    The National Natural Science Foundation of China(61662069);The National Natural Science Foundation of China(61562077);China Postdoctoral Science Foundation Project(2017M610817);The Science and Technology Project of Lanzhou(2013-4-22);The Foudation for Excellent Yong Teachers by Northwest Normal University(NWNU-LKQN-14-7)

Abstract:

User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable identity-based proxy re-signature was introduced.Furthermore,the formal definition and security model of revocable identity-based proxy re-signature were presented.Based on proxy re-signature scheme and binary tree structure,a revocable identity-based proxy re-signature scheme was proposed.In the proposed,scheme,the user's signing key consists of two parts,a secret key and an update key.The secret key transmitted over the secure channel is fixed,but the update key broadcasted by the public channel is periodically changed.Only the user who has not been revoked can obtain the update key,and then randomize the secret key and update the key to generate the corresponding signature key of the current time period.In the standard model,the proposed scheme is proved to be existentially unforgeable against adaptive chosen-identity and chosen-message attacks.In addition,the proposed scheme has properties of bidirectionality and multi-use,and can resist signing key exposure attacks.The analysis results show that the proposed scheme can efficiently revoke the user and update the user’s key,and thus it has good scalability.

Key words: identity-based proxy re-signature, user revocation, standard model, signing key exposure, binary tree

CLC Number: 

No Suggested Reading articles found!