A short identity-based proxy ring signature scheme from RSA

Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo
2015 Computer Standards & Interfaces  
Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed
more » ... heme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm. Keywords Identity-based proxy ring signature, Random oracle model, RSA assumption Disciplines Engineering | Science and Technology Studies Publication Details Asaar, M., Salmasizadeh, M. and Susilo, W. (2015). A short identity-based proxy ring signature scheme from RSA. Computer Standards and Interfaces, 38 144-151. Abstract. Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also it does not suffer from the proxy key exposure attack due to the use of the sequential aggregation paradigm.
doi:10.1016/j.csi.2014.10.002 fatcat:orljsgcrrzgolhdvbhbozyiju4