Title: A provably secure delegated authentication scheme and its applications

Authors: Qun Lin; Jianzhong Li; Xuechang Ren

Addresses: Institute of Mathematics and Statistics, Hanshan Normal University, Chaozhou 521041, China ' Institute of Mathematics and Statistics, Hanshan Normal University, Chaozhou 521041, China ' School of Physics and Mechanical and Electrical Engineering, Xiamen University, Xiamen 361005, China

Abstract: In a proxy signature scheme, an original signer can delegate his/her signing capability to a proxy signer, so that the proxy signer can sign on behalf of the original signer. Proxy signature is an important technology in delegated authentication schemes, so it is important to design provably secure proxy signature schemes. Boldyreva et a1. (2012) gave the definition of proxy signature and formalised a model of security for proxy signature schemes. They not only formalised a model of security for proxy signature schemes, but also specified the adversary's capabilities and goals. In this paper, we propose a new provably secure proxy signature scheme under this model, which is more efficient than that of the existing ones. Furthermore, we use this signature scheme to construct a proxy blind signature scheme, and give the security analysis of the new scheme. Proxy blind signature can be applied in cloud computing.

Keywords: proxy signature; provable security; proxy blind signature; cloud computing.

DOI: 10.1504/IJES.2019.098292

International Journal of Embedded Systems, 2019 Vol.11 No.2, pp.139 - 146

Received: 21 Apr 2016
Accepted: 06 Feb 2017

Published online: 07 Mar 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article