4.2 Article

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key

Journal

JOURNAL OF COMPUTER AND SYSTEM SCIENCES
Volume 120, Issue -, Pages 137-148

Publisher

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.jcss.2021.03.008

Keywords

Lattice; Proxy re-signature; Private re-signature key; Random oracle model

Funding

  1. National Natural Science Foundation of China (NSFC) [61801133]
  2. research project of Education Bureau of Guangdong Province [2019KTSCX131]
  3. research project of Guangzhou University [YK2020007]
  4. Program for Innovative Research Team in Education Department of Guangdong Province [2015KCXTD014, 2016KCXTD017]
  5. major collaborative innovation projects of Guangzhou Education Bureau [120161000]
  6. National Natural Science Foundation for Outstanding Youth Foundation [61722203]
  7. National Natural Science Foundation of China [U1936218, 61702125, U1936116, 61872109]
  8. Yangcheng Scholars Research Project of Guangzhou [202032832]
  9. Guangxi Key Laboratory of Cryptography and Information Security [GCIS201807]
  10. Collaborative Research Fund (CRF) of RGC, Hong Kong [C1008-16G]

Ask authors/readers for more resources

This paper discusses proxy re-signature schemes, introduces different types of schemes, and proposes the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme based on lattice, proving their security in the random oracle model.
In a proxy re-signature scheme, a semi-trusted proxy can convert Alice's (also called as delegatee's) signature into Bob's (also called as delegator's) signature on the same message. However, the proxy itself cannot produce any signatures on behalf of either Alice or Bob. There exists some unidirectional one-use and multi-use (a message can be re-signed a polynomial number of times) proxy re-signature schemes. In some scenarios of big data, it is required to design unidirectional infinite-use (a message can be resigned infinite number of times) proxy re-signature schemes. In this paper, we propose the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme with private re-signature keys based on lattice and prove that they are secure in the random oracle model. (C) 2021 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available