Proxy signature with revocation
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5206 https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6209 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-62092020-07-23T18:40:31Z Proxy signature with revocation XU, Shengmin YANG, Guomin MU, Yi MA, Shu Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when the proxy signer’s key is compromised and/or any misuse of the delegated right is noticed. Although a proxy signature scheme usually specifies a delegation time period, it may happen that the original signer wants to terminate the delegation before it is expired. In order to solve this problem, in this paper we propose a new proxy signature scheme with revocation. Our scheme utilises and combines the techniques in the Naor-Naor-Lotspiech (NNL) framework for broadcast encryption, the Boneh-Boyen-Goh (BBG) hierarchical identity-based encryption and the Boneh-Lynn-Shacham (BLS) short signature scheme and thereby constructing an efficient tree-based revocation mechanism. The unrevoked proxy signer only needs to generate evidences for proving that he/she is a valid proxy signer once in per revocation epoch, and the verifier does not need a revocation list in order to verify the validity of a proxy signature. 2016-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5206 info:doi/10.1007/978-3-319-40367-0_2 https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Proxy signature Revocation Hierarchical structure Information Security Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Proxy signature Revocation Hierarchical structure Information Security Software Engineering |
spellingShingle |
Proxy signature Revocation Hierarchical structure Information Security Software Engineering XU, Shengmin YANG, Guomin MU, Yi MA, Shu Proxy signature with revocation |
description |
Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when the proxy signer’s key is compromised and/or any misuse of the delegated right is noticed. Although a proxy signature scheme usually specifies a delegation time period, it may happen that the original signer wants to terminate the delegation before it is expired. In order to solve this problem, in this paper we propose a new proxy signature scheme with revocation. Our scheme utilises and combines the techniques in the Naor-Naor-Lotspiech (NNL) framework for broadcast encryption, the Boneh-Boyen-Goh (BBG) hierarchical identity-based encryption and the Boneh-Lynn-Shacham (BLS) short signature scheme and thereby constructing an efficient tree-based revocation mechanism. The unrevoked proxy signer only needs to generate evidences for proving that he/she is a valid proxy signer once in per revocation epoch, and the verifier does not need a revocation list in order to verify the validity of a proxy signature. |
format |
text |
author |
XU, Shengmin YANG, Guomin MU, Yi MA, Shu |
author_facet |
XU, Shengmin YANG, Guomin MU, Yi MA, Shu |
author_sort |
XU, Shengmin |
title |
Proxy signature with revocation |
title_short |
Proxy signature with revocation |
title_full |
Proxy signature with revocation |
title_fullStr |
Proxy signature with revocation |
title_full_unstemmed |
Proxy signature with revocation |
title_sort |
proxy signature with revocation |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/5206 https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf |
_version_ |
1770575332071440384 |