Proxy signature with revocation

Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, YANG, Guomin, MU, Yi, MA, Shu
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5206
https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6209
record_format dspace
spelling sg-smu-ink.sis_research-62092020-07-23T18:40:31Z Proxy signature with revocation XU, Shengmin YANG, Guomin MU, Yi MA, Shu Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when the proxy signer’s key is compromised and/or any misuse of the delegated right is noticed. Although a proxy signature scheme usually specifies a delegation time period, it may happen that the original signer wants to terminate the delegation before it is expired. In order to solve this problem, in this paper we propose a new proxy signature scheme with revocation. Our scheme utilises and combines the techniques in the Naor-Naor-Lotspiech (NNL) framework for broadcast encryption, the Boneh-Boyen-Goh (BBG) hierarchical identity-based encryption and the Boneh-Lynn-Shacham (BLS) short signature scheme and thereby constructing an efficient tree-based revocation mechanism. The unrevoked proxy signer only needs to generate evidences for proving that he/she is a valid proxy signer once in per revocation epoch, and the verifier does not need a revocation list in order to verify the validity of a proxy signature. 2016-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5206 info:doi/10.1007/978-3-319-40367-0_2 https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Proxy signature Revocation Hierarchical structure Information Security Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Proxy signature
Revocation
Hierarchical structure
Information Security
Software Engineering
spellingShingle Proxy signature
Revocation
Hierarchical structure
Information Security
Software Engineering
XU, Shengmin
YANG, Guomin
MU, Yi
MA, Shu
Proxy signature with revocation
description Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when the proxy signer’s key is compromised and/or any misuse of the delegated right is noticed. Although a proxy signature scheme usually specifies a delegation time period, it may happen that the original signer wants to terminate the delegation before it is expired. In order to solve this problem, in this paper we propose a new proxy signature scheme with revocation. Our scheme utilises and combines the techniques in the Naor-Naor-Lotspiech (NNL) framework for broadcast encryption, the Boneh-Boyen-Goh (BBG) hierarchical identity-based encryption and the Boneh-Lynn-Shacham (BLS) short signature scheme and thereby constructing an efficient tree-based revocation mechanism. The unrevoked proxy signer only needs to generate evidences for proving that he/she is a valid proxy signer once in per revocation epoch, and the verifier does not need a revocation list in order to verify the validity of a proxy signature.
format text
author XU, Shengmin
YANG, Guomin
MU, Yi
MA, Shu
author_facet XU, Shengmin
YANG, Guomin
MU, Yi
MA, Shu
author_sort XU, Shengmin
title Proxy signature with revocation
title_short Proxy signature with revocation
title_full Proxy signature with revocation
title_fullStr Proxy signature with revocation
title_full_unstemmed Proxy signature with revocation
title_sort proxy signature with revocation
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/5206
https://ink.library.smu.edu.sg/context/sis_research/article/6209/viewcontent/10.1007_978_3_319_40367_0.pdf
_version_ 1770575332071440384