File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Secure delegation of signing power from factorization

TitleSecure delegation of signing power from factorization
Authors
Keywordsdigital signature
factorization
provable security
proxy signature
Issue Date2015
Citation
Computer Journal, 2015, v. 58, n. 4, p. 867-877 How to Cite?
Abstract© The British Computer Society 2013. All rights reserved. Delegation of signing is a working way common in office automation work, and is also an important approach to establish trust. Proxy signature is an important cryptographic primitive for delegating signing powers and it has found many real-world applications. The existing proxy signature schemes from factorization assumption are either insecure or inefficient. In this paper, we propose a novel, efficient and provably secure proxy signature scheme from factorization. Our construction makes use of a factorization-based key exposure-free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to a chameleon hash value to generate a valid proxy signature. As a result, our scheme is highly efficient in terms of the computation of a proxy signature. We also provide a formal security proof by classifying the adversaries into three categories. Comparisons demonstrate that the new scheme outperforms the known ones in terms of security, computational efficiency and the length of the public key.
Persistent Identifierhttp://hdl.handle.net/10722/280825
ISSN
2021 Impact Factor: 1.762
2020 SCImago Journal Rankings: 0.319
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYu, Yong-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorMu, Yi-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorWu, Huai-
dc.date.accessioned2020-02-17T14:35:02Z-
dc.date.available2020-02-17T14:35:02Z-
dc.date.issued2015-
dc.identifier.citationComputer Journal, 2015, v. 58, n. 4, p. 867-877-
dc.identifier.issn0010-4620-
dc.identifier.urihttp://hdl.handle.net/10722/280825-
dc.description.abstract© The British Computer Society 2013. All rights reserved. Delegation of signing is a working way common in office automation work, and is also an important approach to establish trust. Proxy signature is an important cryptographic primitive for delegating signing powers and it has found many real-world applications. The existing proxy signature schemes from factorization assumption are either insecure or inefficient. In this paper, we propose a novel, efficient and provably secure proxy signature scheme from factorization. Our construction makes use of a factorization-based key exposure-free chameleon hash function in the delegation phase and the proxy signer needs only to find a collision to a chameleon hash value to generate a valid proxy signature. As a result, our scheme is highly efficient in terms of the computation of a proxy signature. We also provide a formal security proof by classifying the adversaries into three categories. Comparisons demonstrate that the new scheme outperforms the known ones in terms of security, computational efficiency and the length of the public key.-
dc.languageeng-
dc.relation.ispartofComputer Journal-
dc.subjectdigital signature-
dc.subjectfactorization-
dc.subjectprovable security-
dc.subjectproxy signature-
dc.titleSecure delegation of signing power from factorization-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1093/comjnl/bxt144-
dc.identifier.scopuseid_2-s2.0-84926625524-
dc.identifier.volume58-
dc.identifier.issue4-
dc.identifier.spage867-
dc.identifier.epage877-
dc.identifier.eissn1460-2067-
dc.identifier.isiWOS:000359137500027-
dc.identifier.issnl0010-4620-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats