Controlled Proxy Re-signing - Conditional Proxy Re-Signatures

S. Sree Vivek, Guhan Balasubramanian

2015

Abstract

Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy re-cryptography controlling the proxy from resigning unintended signatures of the delegatee is not possible. To address this concern, we propose a useful delegation scheme called as conditional proxy re-signature. In this paper, we propose a security model for unidirectional conditional proxy re-signature, present a concrete scheme and prove the security of the scheme in the random oracle model.

References

  1. Ateniese, G., Fu, K., Green, M., and Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30.
  2. Ateniese, G. and Hohenberger, S. (2005). Proxy resignatures: new definitions, algorithms, and applications. In ACM Conference on Computer and Communications Security, pages 310-319.
  3. Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In EUROCRYPT, pages 127-144.
  4. Boneh, D., Lynn, B., and Shacham, H. (2001). Short signatures from the weil pairing. In ASIACRYPT, pages 514-532.
  5. Chow, S. S. M. and Phan, R. C.-W. (2008). Proxy resignatures in the standard model. In ISC, pages 260- 276.
  6. Chu, C.-K., Weng, J., Chow, S. S. M., Zhou, J., and Deng, R. H. (2009). Conditional proxy broadcast reencryption. In ACISP, pages 327-342.
  7. Fang, L., Susilo, W., Ge, C., and Wang, J. (2011). Interactive conditional proxy re-encryption with fine grain policy. Journal of Systems and Software, 84(12):2293-2302.
  8. Fang, L., Susilo, W., Ge, C., and Wang, J. (2012). Hierarchical conditional proxy re-encryption. Computer Standards and Interfaces, vol - 34(no - 4):380 - 389.
  9. Fang, L., Susilo, W., and Wang, J. (2009). Anonymous conditional proxy re-encryption without random oracle. In ProvSec, pages 47-60.
  10. Fuchsbauer, G. and Pointcheval, D. (2008). Anonymous proxy signatures. In SCN, pages 201-217.
  11. Ivan, A.-A. and Dodis, Y. (2003). Proxy cryptography revisited. In NDSS.
  12. Jos Mara de Fuentes, Ana Isabel Gonzlez-Tablas, A. R. (2011). Overview of security issues in vehicular adhoc networks. In Handbook of Research on Mobility and Computing, pages 894-911. Hershey: IGI Global.
  13. Libert, B. and Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In ACM CCS, pages 511- 520.
  14. Mambo, M., Usuda, K., and Okamoto, E. (1996). Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM, CCS 7896, pages 48-57. ACM.
  15. Maxim Raya, J. H. (2005). The security of vehicular ad hoc networks. In Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN - 2005, pages 11-21. ACM.
  16. S. Sree Vivek, S. Sharmila Deva Selvi, V. R. and Rangan, C. P. (2011). Conditional proxy re-encryption - a more efficient construction. In CNSA, CCIS 196, pages 502-512.
  17. Shao, J., Cao, Z., Wang, L., and Liang, X. (2007). Proxy re-signature schemes without random oracles. In INDOCRYPT, pages 197-209.
  18. Shao, J., Feng, M., Zhu, B., Cao, Z., and Liu, P. (2010). The security model of unidirectional proxy re-signature with private re-signature key. In ACISP, pages 216- 232.
  19. Shao, J., Wei, G., Ling, Y., and Xie, M. (2011). Identitybased conditional proxy re-encryption. In IEEE Conference on Communications - ICC, pages 1-5.
  20. Wang, X. a. and Yang, X. (2009). On ddos attack against proxy in proxy re-encryption and proxy re-signature. In Proceedings of the 2009 Ninth IEEE International Conference on Computer and Information Technology - Volume 02, CIT 7809, pages 213-218. IEEE Computer Society.
  21. Watanabe, Y. and Numao, M. (2002). Conditional cryptographic delegation for p2p data sharing. In Proceedings of the 5th International Conference on Information Security, ISC 7802, pages 309-321. SpringerVerlag.
  22. Weng, J., Deng, R. H., Ding, X., Chu, C.-K., and Lai, J. (2009a). Conditional proxy re-encryption secure against chosen-ciphertext attack. In ASIACCS, pages 322-332.
  23. Weng, J., Yang, Y., Tang, Q., Deng, R. H., and Bao, F. (2009b). Efficient conditional proxy re-encryption with chosen-ciphertext security. In ISC, pages 151- 166.
  24. Zhang, X. and Chen, M.-R. (2009). On the security of a conditional proxy re-encryption. IEICE Transactions, 92-A(10):2644-2647.
Download


Paper Citation


in Harvard Style

Sree Vivek S. and Balasubramanian G. (2015). Controlled Proxy Re-signing - Conditional Proxy Re-Signatures . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 186-193. DOI: 10.5220/0005510601860193


in Bibtex Style

@conference{secrypt15,
author={S. Sree Vivek and Guhan Balasubramanian},
title={Controlled Proxy Re-signing - Conditional Proxy Re-Signatures},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={186-193},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005510601860193},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
SN - 978-989-758-117-5
AU - Sree Vivek S.
AU - Balasubramanian G.
PY - 2015
SP - 186
EP - 193
DO - 10.5220/0005510601860193