Back to Search
Start Over
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
- Source :
-
Journal of Computer & System Sciences . Sep2021, Vol. 120, p137-148. 12p. - Publication Year :
- 2021
-
Abstract
- In a proxy re-signature scheme, a semi-trusted proxy can convert Alice's (also called as delegatee's) signature into Bob's (also called as delegator's) signature on the same message. However, the proxy itself cannot produce any signatures on behalf of either Alice or Bob. There exists some unidirectional one-use and multi-use (a message can be re-signed a polynomial number of times) proxy re-signature schemes. In some scenarios of big data, it is required to design unidirectional infinite-use (a message can be re-signed infinite number of times) proxy re-signature schemes. In this paper, we propose the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme with private re-signature keys based on lattice and prove that they are secure in the random oracle model. [ABSTRACT FROM AUTHOR]
- Subjects :
- *POLYNOMIAL time algorithms
*BIG data
Subjects
Details
- Language :
- English
- ISSN :
- 00220000
- Volume :
- 120
- Database :
- Academic Search Index
- Journal :
- Journal of Computer & System Sciences
- Publication Type :
- Academic Journal
- Accession number :
- 150188343
- Full Text :
- https://doi.org/10.1016/j.jcss.2021.03.008