Open Access Open Access  Restricted Access Subscription Access

A Proxy Transitive Signature Scheme

Fei Zhu,
Xiaoling Tao,
Chao Lin,
Wei Wu,

Abstract


Motivated by the research of privacy protection in the graph-based big data system, we propose a new signature scheme. The properties of the constructed signature scheme are twofold. On one hand, it is consistent with the requests of the proxy signatures. Our method allows a signer to delegate his/her signing right to another user in such a way that the latter can validly sign messages on behalf of the former, and other parties (who are not designated as the proxy signer) cannot create a valid proxy signature. On the other hand, it satisfies the properties of transitive signatures. One of the fundamental but vital properties is composability, which means that given two signatures σ_ij and σ_jk on adjacent edges (i, j) and ( j,k) , anyone without knowing the signer’s secret key can easily derive the digital signature σ_ik of the edge (i,k) . This property allows the signer to authenticate a graph in a cost-saving manner. Actually, our proposed design meets all the features needed for proxy signatures and transitive signatures, and it is provably secure in the random oracle model.


Citation Format:
Fei Zhu, Xiaoling Tao, Chao Lin, Wei Wu, "A Proxy Transitive Signature Scheme," Journal of Internet Technology, vol. 19, no. 4 , pp. 1273-1284, Jul. 2018.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Executive Committee, Taiwan Academic Network, Ministry of Education, Taipei, Taiwan, R.O.C
JIT Editorial Office, Library and Information Center, National Dong Hwa University
No. 1, Sec. 2, Da Hsueh Rd. Shoufeng, Hualien 97401, Taiwan, R.O.C.
Tel: +886-3-931-7017  E-mail: jit.editorial@gmail.com