Proxy Re-Signature Scheme for Stream Exchange
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    To tackle the problems of security stream exchange in the large-scale complicated network, this paper applies proxy re-signature technology for the first time to solve the flow exchange security issues, and proposes a proxy re-signature scheme based on trapdoor Hash function for stream exchange. Firstly, aiming at the key exposure problem of trapdoor Hash function for stream exchange, a new trapdoor Hash functions without key exposure (EDL-MTH) is put forward and its security is analyzed. Then, a new proxy re-signature scheme based on EDL-MTH is constructed and is proved against the chosen-message attack in the random oracle model. Furthermore, the performance of the scheme is analyzed contrast to the existing proven security proxy signature scheme, and the result shows the efficiency becomes more prominent while the scale of stream exchange is increased. Finally, a case study is provided to demonstrate its availability and performance in security stream exchange.

    Reference
    Related
    Cited by
Get Citation

孙奕,陈性元,杜学绘,陈亮,徐建.一种用于流交换的代理重签名方案.软件学报,2015,26(1):129-144

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:March 19,2013
  • Revised:August 21,2013
  • Adopted:
  • Online: January 04,2015
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063