Proxy Signature with Revocation

Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on beh

  • PDF / 339,597 Bytes
  • 16 Pages / 439.37 x 666.142 pts Page_size
  • 113 Downloads / 242 Views

DOWNLOAD

REPORT


2

Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia {sx914,gyang,ymu,sma}@uow.edu.au College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510640, Guangdong, China

Abstract. Proxy signature is a useful cryptographic primitive that allows signing right delegation. In a proxy signature scheme, an original signer can delegate his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when the proxy signer’s key is compromised and/or any misuse of the delegated right is noticed. Although a proxy signature scheme usually specifies a delegation time period, it may happen that the original signer wants to terminate the delegation before it is expired. In order to solve this problem, in this paper we propose a new proxy signature scheme with revocation. Our scheme utilises and combines the techniques in the Naor-Naor-Lotspiech (NNL) framework for broadcast encryption, the Boneh-Boyen-Goh (BBG) hierarchical identity-based encryption and the Boneh-Lynn-Shacham (BLS) short signature scheme and thereby constructing an efficient tree-based revocation mechanism. The unrevoked proxy signer only needs to generate evidences for proving that he/she is a valid proxy signer once in per revocation epoch, and the verifier does not need a revocation list in order to verify the validity of a proxy signature. Keywords: Proxy signature

1

· Revocation · Hierarchical structure

Introduction

Mambo, Usuda and Okamoto introduced the concept of proxy signatures in 1996 [16,17]. In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designated person called the proxy signer, and then the proxy signer is able to sign the message on behalf of the original signer. There are four types of delegation in proxy signature. Mambo et al. [16] proposed three of them in their seminal work: full delegation, partial delegation and delegation by warrant. In the full delegation, the original signer just gives his signing key to the proxy signer as the proxy signing key. Thus, the proxy signer has the same signing ability as the original signer so that the real c Springer International Publishing Switzerland 2016  J.K. Liu and R. Steinfeld (Eds.): ACISP 2016, Part II, LNCS 9723, pp. 21–36, 2016. DOI: 10.1007/978-3-319-40367-0 2

22

S. Xu et al.

signer of a signature is indistinguishable. To overcome this drawback, partial delegation was proposed, in which the original signer and the proxy signer work together to derive the proxy signing key that consists of partial private keys of the original signer and the proxy signer. Partial delegation is further classified into proxy-unprotected delegation and proxy-protected delegation [11]. In proxy-unprotected pa