Skip to main content
placeholder image

A short identity-based proxy ring signature scheme from RSA

Journal Article


Download full-text (Open Access)

Abstract


  • Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful

    where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based

    proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed

    scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in

    security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing

    schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack

    due to the use of the sequential aggregation paradigm.

UOW Authors


  •   Asaar, Maryam Rjabzadeh (external author)
  •   Salmasizadeh, Mahmoud (external author)
  •   Susilo, Willy

Publication Date


  • 2015

Citation


  • Asaar, M., Salmasizadeh, M. & Susilo, W. (2015). A short identity-based proxy ring signature scheme from RSA. Computer Standards and Interfaces, 38 144-151.

Scopus Eid


  • 2-s2.0-84913569259

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4279&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3263

Has Global Citation Frequency


Number Of Pages


  • 7

Start Page


  • 144

End Page


  • 151

Volume


  • 38

Place Of Publication


  • Netherlands

Abstract


  • Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful

    where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based

    proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed

    scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in

    security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing

    schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack

    due to the use of the sequential aggregation paradigm.

UOW Authors


  •   Asaar, Maryam Rjabzadeh (external author)
  •   Salmasizadeh, Mahmoud (external author)
  •   Susilo, Willy

Publication Date


  • 2015

Citation


  • Asaar, M., Salmasizadeh, M. & Susilo, W. (2015). A short identity-based proxy ring signature scheme from RSA. Computer Standards and Interfaces, 38 144-151.

Scopus Eid


  • 2-s2.0-84913569259

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=4279&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3263

Has Global Citation Frequency


Number Of Pages


  • 7

Start Page


  • 144

End Page


  • 151

Volume


  • 38

Place Of Publication


  • Netherlands