Proxy Re-Signature Scheme from CBS to IBS

Article Preview

Abstract:

In 1998, Blaze, Bleumer and Strauss proposed a new kind of cryptographic primitive called proxy re-signature. In proxy re-signature, a proxy can transform a signature computed under Alice’s secret key into one that can be verified by Bob’s public key. In 2005, Ateniese et al proposed a few re-signature schemes and also discussed its several potential applications. In this paper, we propose the first proxy re-signature scheme from certificate based signature (CBS) to identity based signature (IBS) with the help of PKG.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

355-358

Citation:

Online since:

July 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. Ateniese, S. Hohenberger. Proxy re-signatures: new definitions, algorithms, and applications. In ACM CCS 2005, pages 310–319, (2006).

DOI: 10.1145/1102120.1102161

Google Scholar

[2] G. Taban, A. Cardenas, V. Gligor. Towards a secure and interoperable DRM architecture. In ACM DRM 2006, pages 69–78, (2006).

DOI: 10.1145/1179509.1179524

Google Scholar

[3] J. Shao, Z. Cao, L. Wang, X. Liang. Proxy re-signature schemes without random oracles. In INDOCRYPT 2007, volume 4859 of LNCS, pages: 197–209, (2007).

DOI: 10.1007/978-3-540-77026-8_15

Google Scholar

[4] B. Libert and D. Vergnaud. Multi-use unidirectional proxy re-signatures. In CCS 2008, ACM Press, pages 511–520, (2008).

DOI: 10.1145/1455770.1455835

Google Scholar

[5] J. Shao, M. Feng, B. Zhu, Z. Cao, P. Liu. The security model of unidirectional proxy re-signature with private re-signature key. In ACISP 2010, volume 6168 of LNCS, pages 216–232, (2010).

DOI: 10.1007/978-3-642-14081-5_14

Google Scholar

[6] T. Matsuo. Proxy re-encryption systems for identity-based encryption. In PAIRING 2007, volume 4575 of LNCS, pages 247–267, (2007).

DOI: 10.1007/978-3-540-73489-5_13

Google Scholar

[7] B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005, volume 3494 of LNCS, pages 114–127, (2005).

DOI: 10.1007/11426639_7

Google Scholar