یک (t , n) طرح امضای وکالتی آستانه با تأییدکننده مشخص جدید و اثبات امنیتی آن در مدل استاندارد

نویسندگان

1 کارشناس ارشد، آزمایشگاه تئوری اطلاعات و مخابرات امن، دانشکده مهندسی برق، دانشگاه صنعتی شریف

2 مربی، دانشگاه جامع امام حسین (ع)

3 استاد، آزمایشگاه تئوری اطلاعات و مخابرات امن، دانشکده مهندسی برق، دانشگاه صنعتی شریف

چکیده

در یک (t , n) طرح امضای وکالتی آستانه با تأییدکننده مشخص، صاحب امضاء، قابلیت امضای خود را به گروه n نفره از نمایندگان خود اعطاء می‌نماید تا در صورت توافق حداقل t نفر، بتوانند روی متن موردنظر امضای وکالتی صورت دهند. البته، این امضاء برای یک گیرنده مشخص صادر میشود و بنابراین، تنها او میتواند اعتبار امضاء را بررسی نماید. در این مقاله، یک (t , n) طرح امضای وکالتی آستانه با تأییدکننده مشخص جدید، ارائه شده و نیز نشان داده میشود که طرح ارائه‌شده، در مدل استاندارد دارای امنیت اثباتپذیر است. امنیت طرح ارائه‌شده، بر اساس فرض سختی مسئله دیفی- هِلمن دوخطی گَپ GDBH استوار است.

کلیدواژه‌ها


عنوان مقاله [English]

A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model

نویسندگان [English]

  • Mohammad Beheshti Atashgah 1
  • Mahmoud Gardeshi 2
  • Mohammad Reza Aref 3
1 Senior Expert, Laboratory of Information Theory and Secure Telecommunications, Faculty of Electrical Engineering, Sharif University of Technology
2 Instructor, Imam Hossein University (AS)
3 Professor, Information Theory and Secure Telecommunications Laboratory, Faculty of Electrical Engineering, Sharif University of Technology
چکیده [English]

In a designated verifier threshold proxy signature scheme, an original signer can delegate his\her signing
power to proxy signers such that any or more out of proxy signers can sign messages on behalf of the
original signer but or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature
is issued for a designated receiver and therefore only the designated receiver can validate the proxy
signature. In this paper, we propose a new designated verifier threshold proxy signature scheme and also
show that our proposed scheme has provable security in the standard model. The security of proposed
scheme is based on the assumption.

کلیدواژه‌ها [English]

  • Proxy signature scheme
  • Threshold proxy signature scheme
  • Provable security
  • Standard model
  • Bilinear pairing
[1] M. Mambo, K. Usuda, E. Okamoto, "Proxy signature: Delegation of the power to sign messages", IEICE Transactions
on Fundamentals, E79-A 9 (1996), pp. 1338–1353.
[2] J. Y. Lee, J.H. Cheon, S. Kim, "An analysis of proxy signatures: Is a secure channel necessary? ", in: CT-RSA 2003,
in: LNCS, vol. 2612, Springer-Verlag, Berlin, 2003, pp. 68–79.
[3] B. Lee, H. Kim, K. Kim, "Secure mobile agent using strong nondesignated proxy signature", in: ACISP01, in: LNCS, vol. 2119, Springer-Verlag, Berlin, 2001, pp. 474–486.
[4] S. J. Kim, S. J. Park, D. H. Won, "Proxy Signatures, revisited." ICICS’97, LNCS 1334, Springer-Verlag, 1997,
pp. 223-232.
[5] K. Zhang, "Threshold proxy signature schemes," Information Security Workshop, Japan, 1997, pp. 191-197.
[6] J. Hu & J. Zhang, "Cryptanalysis & improvement of a threshold proxy signature scheme", Computer Standards &
Interfaces, 2009, pp.169–173.
[7] Z. Tan, "Improvement on C.-L Hsu et al's threshold proxy signature scheme with known signers", international Conference on ConvergenceInformation Technology, 2007, pp. 1463–1467.
[8] F. kong, J. Yu, B. Qin, M. Li, D. Li, "Security Analysis and Improvement of a (t,n) Threshold Proxy Signature Scheme" 8th ACIS International Conference on Engineering, Artificial Intelligent, Networking and Parallel\ Distributed Computing, 2007, pp. 923–926.
[9] S. H. Seo, K. A. Shim, S. H. Lee. "A mediated proxy signature scheme with fast revocation for electronic transactions".
Proceedings of the 2nd International Conference on Trust, Privacy and Security in Digital Business, Aug 22-26, 2005, Copenhagen, Denmark. LNCS 3592.Berlin, German: Springer-Verlag, 2005,pp. 216–225.
[10] M. Bellare, P. Rogaway, Random Oracles are Practical: "A Paradigm for Designing Efficient Protocols", Proceeding of the First ACM Conference on Computer and Communications Security, 1993, pp. 62–73.
[11] Boldyreva, A. Palacio and B. Warinschi, "SecureProxy Signature Schemes for Delegation of Signing Rights", http://eprint.iacr.org/2003/096.
[12] Gu, Y. Zhu, "Provable Security of ID-Based Proxy Signature Schemes", ICCNMC 2005, LNCS 3619, Springer- Verlag Heidelberg, 2005, pp. 1277–1286.
[13] H. Ji, W. Han, L. Zhao and Y. Wang, "AnIdentity-Based Proxy Signature from Bilinear Pairings", WASE International
Conference on Information Engineering, 2009, pp. 14–17.
[14] D. Boneh, X. Boyen, "Efficient selective-id secure identity based encryption without random oracles", In Proceeding
of the International Conference on Advances in Cryptology (EUROCRYPT'04), Lecture Notes in Computer Science. Springer-Verlag, 2004.
[15] B. Waters. "Efficient identity based encryption without random oracles". Proceedings of Advances in Cryptology-
Eurocrypt 2005, May 22–26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, German: Springer-Verlag, 2005, pp. 114–127.
[16] X. Huang, W. Susilo, Y. Mu and W.Wu, "Proxy Signature without Random Oracles", in: MSN 2006, in: LNCS, vol.
4325, Springer-Verlag, Berlin, 2006, pp. 473–484.
[17] Y. Yu, C. Xu, X. Zhang, Y. Liao, "Designated verifier proxy signature scheme without random oracles", computers
and Mathematics with Applications 57 (2009), pp.1352 –136.