Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing...

Full description

Bibliographic Details
Main Authors: Li Huixian, Han Zhipeng, Wang Liqin, Pang Liaojun
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8456493/
id doaj-e9e51d46526f4b95a9744d0dacc59d92
record_format Article
spelling doaj-e9e51d46526f4b95a9744d0dacc59d922021-03-29T21:14:18ZengIEEEIEEE Access2169-35362018-01-016538695388110.1109/ACCESS.2018.28690418456493Blind Proxy Re-Signature Scheme Based on Isomorphisms of PolynomialsLi Huixian0https://orcid.org/0000-0001-8098-9573Han Zhipeng1Wang Liqin2Pang Liaojun3https://orcid.org/0000-0002-2388-2806School of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaSchool of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaSchool of Computer Science and Engineering, Northwestern Polytechnical University, Xi’an, ChinaDepartment of Computer Science, Wayne State University, Detroit, MI, USAMost of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.https://ieeexplore.ieee.org/document/8456493/Digital signaturespublic keyblindnesssecurity
collection DOAJ
language English
format Article
sources DOAJ
author Li Huixian
Han Zhipeng
Wang Liqin
Pang Liaojun
spellingShingle Li Huixian
Han Zhipeng
Wang Liqin
Pang Liaojun
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
IEEE Access
Digital signatures
public key
blindness
security
author_facet Li Huixian
Han Zhipeng
Wang Liqin
Pang Liaojun
author_sort Li Huixian
title Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
title_short Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
title_full Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
title_fullStr Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
title_full_unstemmed Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
title_sort blind proxy re-signature scheme based on isomorphisms of polynomials
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on. However, these problems will be unsecure when facing the attack of quantum computers. Motivated by these concerns, we proposed a blind proxy re-signature scheme based on the problem of isomorphisms of polynomials, which can resist quantum attack, and gave its security proof under the random oracle model. In the proposed scheme, the message can be kept blind by using the hash function, and the delegatee's identity can be kept anonymous by using the problem of isomorphisms of polynomials. Compared with the existing schemes, the new scheme has more secure properties, such as quantum resistance, high efficiency, message blindness, and delegatee anonymity. It is concluded that the proposed scheme has a good application prospect in the future quantum computing environment with low-power hardware.
topic Digital signatures
public key
blindness
security
url https://ieeexplore.ieee.org/document/8456493/
work_keys_str_mv AT lihuixian blindproxyresignatureschemebasedonisomorphismsofpolynomials
AT hanzhipeng blindproxyresignatureschemebasedonisomorphismsofpolynomials
AT wangliqin blindproxyresignatureschemebasedonisomorphismsofpolynomials
AT pangliaojun blindproxyresignatureschemebasedonisomorphismsofpolynomials
_version_ 1724193358079852544