Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8456493/ |
id |
doaj-e9e51d46526f4b95a9744d0dacc59d92 |
---|---|
record_format |
Article |
spelling |
doaj-e9e51d46526f4b95a9744d0dacc59d922021-03-29T21:14:18ZengIEEEIEEE Access2169-35362018-01-016538695388110.1109/ACCESS.2018.28690418456493Blind Proxy Re-Signature Scheme Based on Isomorphisms of PolynomialsLi Huixian0https://orcid.org/0000-0001-8098-9573Han Zhipeng1Wang Liqin2Pang Liaojun3https://orcid.org/0000-0002-2388-2806School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaSchool of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaSchool of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaDepartment of Computer Science, Wayne State University, Detroit, MI, USAMost of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.https://ieeexplore.ieee.org/document/8456493/Digital signaturespublic keyblindnesssecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Li Huixian Han Zhipeng Wang Liqin Pang Liaojun |
spellingShingle |
Li Huixian Han Zhipeng Wang Liqin Pang Liaojun Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials IEEE Access Digital signatures public key blindness security |
author_facet |
Li Huixian Han Zhipeng Wang Liqin Pang Liaojun |
author_sort |
Li Huixian |
title |
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials |
title_short |
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials |
title_full |
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials |
title_fullStr |
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials |
title_full_unstemmed |
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials |
title_sort |
blind proxy re-signature scheme based on isomorphisms of polynomials |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware. |
topic |
Digital signatures public key blindness security |
url |
https://ieeexplore.ieee.org/document/8456493/ |
work_keys_str_mv |
AT lihuixian blindproxyresignatureschemebasedonisomorphismsofpolynomials AT hanzhipeng blindproxyresignatureschemebasedonisomorphismsofpolynomials AT wangliqin blindproxyresignatureschemebasedonisomorphismsofpolynomials AT pangliaojun blindproxyresignatureschemebasedonisomorphismsofpolynomials |
_version_ |
1724193358079852544 |