Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet

Download
89 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_42,
        author={Yanfang Lei and Mingsheng Hu and Bei Gong and Lipeng Wang and Yage Cheng},
        title={A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Threshold proxy re-signature Server-assisted authentication protocol Secret sharing Unforgeability Robustness Completeness},
        doi={10.1007/978-3-030-21373-2_42}
    }
    
  • Yanfang Lei
    Mingsheng Hu
    Bei Gong
    Lipeng Wang
    Yage Cheng
    Year: 2019
    A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_42
Yanfang Lei1, Mingsheng Hu1,*, Bei Gong2, Lipeng Wang1, Yage Cheng1
  • 1: Zhengzhou Normal University
  • 2: Beijing University of Technology
*Contact email: hero_jack@163.com

Abstract

In recent years, the mobile Internet has been rapidly developed and widely used. Aiming at the problems of the weak computing power of mobile internet mobile terminal equipment, limited energy supply and high security requirements due to the complexity of mobile Internet environment, we proposes a secure and efficient server-assisted verification threshold proxy re-signature scheme, and the correctness of the program is verified. The proposed scheme includes a threshold proxy re-signature algorithm and a server-assisted authentication protocol scheme. Threshold proxy re-signature is a technique of proxy re-signature using threshold, which can decentralize the proxy’s signature rights. In the scheme, the verifier and the server send the complex signature verification operation to a semi-trusted server through the protocol, which effectively reduces the computational load of the verifier. The security analysis results show that the new scheme is safe and it is proved that the scheme is safe under collusion attack and adaptive selection message attack under the standard model. The performance analysis results show that the new scheme proposed in this paper has shorter signature length, less computational cost, higher verification efficiency and better adaptability to the mobile Internet environment.