Back to Search Start Over

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.

Authors :
Chen, Wenbin
Li, Jin
Huang, Zhengan
Gao, Chongzhi
Yiu, Siuming
Jiang, Zoe L.
Source :
Journal of Computer & System Sciences. Sep2021, Vol. 120, p137-148. 12p.
Publication Year :
2021

Abstract

In a proxy re-signature scheme, a semi-trusted proxy can convert Alice's (also called as delegatee's) signature into Bob's (also called as delegator's) signature on the same message. However, the proxy itself cannot produce any signatures on behalf of either Alice or Bob. There exists some unidirectional one-use and multi-use (a message can be re-signed a polynomial number of times) proxy re-signature schemes. In some scenarios of big data, it is required to design unidirectional infinite-use (a message can be re-signed infinite number of times) proxy re-signature schemes. In this paper, we propose the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme with private re-signature keys based on lattice and prove that they are secure in the random oracle model. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00220000
Volume :
120
Database :
Academic Search Index
Journal :
Journal of Computer & System Sciences
Publication Type :
Academic Journal
Accession number :
150188343
Full Text :
https://doi.org/10.1016/j.jcss.2021.03.008