Abstract
The existing proxy signature schemes with the proxy revocation function are proven to be malleable and do not possess strong unforgeability. Motivated by these concerns, a new proxy signature scheme with fast revocation is proposed, and it can be proved that the proposed scheme can achieve strong unforgeability in the standard model. By using this scheme, the original signer can generate the delegation warrant for the proxy signer, and at the same time, he/she can perform the immediate revocation to completely terminate the delegation when needed. Analyses show that the proposed scheme satisfies all of the security requirements of proxy signature and has shorter public parameters than the existing ones.
1. Introduction
As a variation of digital signature [1], proxy signature [2] allows the original signer to delegate his/her signature rights to a proxy signer. In this case, the designated proxy signer can generate valid signatures like the original signer. Proxy signature has many important applications in our daily life. For example, in the sensor networks aiming at collecting temperature data, sensor nodes are responsible for collecting data and sending them to the sink node. With data from sensor nodes, the sink node processes them and issues the analysis result publicly through Internet. Generally, it is necessary for people to judge where this result comes from, and in this case the analysis result should be signed by the sink node before releasing it. Normally, the sink node is able to carry out the signature process by itself. However, it maybe has to choose a trustworthy and capable equipment to replace itself to implement signature for some reason, and the selected equipment is called a proxy signer. This is a typical case for sensor-based application systems. In fact, proxy signature has found even wider applications, including electronic commerce, e-cash, and mobile agents, where delegation of rights is quite common [3]. Thus, proxy signature becomes one of the hot topics in the field of information security, and many schemes [4–9] have been proposed recently.
In proxy signature, it is important to securely process the proxy revocation problem when a valid delegation expires or the original signer wants to revoke a valid delegation ahead of schedule for some reason. For instance, in the above example, the signature rights can be assigned to other equipment by the sink node. However, during the period of delegation, the sink node maybe wants to repeal the rights before the end of the delegation. In this case, the delegation revocation function is needed. Although fast revocation has already been taken into account in several proxy signature schemes [10–13], none of them have achieved the security notion of the secure existential unforgeablility, since an adversary can still generate a valid signature on the same message without the private key. That is to say, the adversary is still able to forge a signature after the proxy signer is revoked. The basic reason is that these proxy signature schemes are designed by using 2-level hierarchical Waters' schemes, but Waters et al.'s scheme is malleable [5, 14].
Motivated by the above concerns, we proposed a new proxy signature scheme with fast revocation in the standard model under the computational Diffie-Hellman assumption and proved that it can achieve strong unforgeability in the standard model. Compared with the existing proxy signature schemes, the proposed scheme has the following merits: shorter size of public parameters and tighter security reduction. At the same time, the proposed scheme has the property of fast revocation. In a word, our scheme achieves strong unforgeability of the proxy signature scheme with revocation.
The rest of this paper is organized as follows: in Section 2, we shall briefly review related works in the field of proxy signature. Hard problems and security notions are given in Section 3. In Section 4, we introduce the new proxy signature scheme. In Section 5, we analyze the correctness and security of our scheme and compare our scheme with existing schemes in terms of computational efficiency, the number of public parameters, and security. Finally, we conclude this paper in Section 6.
2. Related Works
The concept of proxy signature was first introduced by Mambo et al. [2], and it has been considered the most promising technique to solve the delegation problem of signature rights [15]. Since then, proxy signature has attracted a considerable amount of interest from researchers. According to the delegation types [2], proxy signature can be classified into three types: full delegation, partial delegation, and delegation by warrant. For the full delegation [15], the original signer directly sends his/her private key to the proxy signer. It is easy to implement the full delegation, but the signature produced by the proxy signer is completely indistinguishable from the one produced by the original signer. In fact, such schemes are obviously impractical and insecure, because the proxy signer has the same right as the original signer, and the original signer cannot achieve revocation of delegated rights. For the partial delegation [15], the original signer generates a proxy key from his/her private key and securely transfers it to the proxy signer, and the proxy signer uses this proxy key to sign messages on behalf of the original signer. Moreover, partial delegation is classified as proxy-unprotected and proxy-protected based on the protection of the proxy signer [15]. However, the signed messages by the proxy signer are not limited, so the proxy signer may sign some messages that the original signer is not willing to sign. To eliminate this drawback, Kim et al. [16] presented the partial delegation scheme with warrant, which combines the merits of the partial delegation and the delegation by warrant. In the delegation by warrant, the original signer specifies what kind of message is delegated in the warrant and produces a signature on the warrant. Then, the proxy signer uses this signature and his private key to create a valid proxy signature on behalf of the original signer. But this scheme was proven insecure later.
Recently, several proxy signature schemes have been put forward. In 2008, Liu et al. [6] presented a proxy multisignature scheme in the standard model, which allows a proxy signer to generate proxy signatures on behalf of two or more original signers. In 2012, Hwang et al. [17] proposed a variation of proxy signature scheme called threshold multiproxy multisignature scheme with shared verification based on the RSA problem. Sahu and Saraswat [18], in 2015, proposed an efficient and provably secure identity-based multi-proxy signature scheme, which allows a user to transfer its signature rights to a group of proxy signers.
However, most of the existing proxy signature schemes have the following essential shortcomings [19]. First, the declaration of a valid delegation in the warrant is useless. The proxy signer can still produce a signature even if the delegation period has expired. Second, when the original signer wants to revoke the delegation earlier than his/her schedule, he/she can do nothing. Thus, the revocation of delegated rights is an essential problem of proxy signature. To solve these problems, some schemes with revocation have been proposed. For example, Sun and Chen [20] proposed a time-stamped proxy signature scheme and claimed that the revocation problem can be solved by using a time-stamp. However, their scheme suffers from security weakness and cannot solve the second problem [21]. Seo et al. [19] proposed a mediated proxy signature scheme to solve the proxy revocation problem by using a special entity, called SEM, which is an online partially trusted server. But the shortcoming of the above schemes [19–21] is that they cannot be proven secure in the random oracle model or in the standard model. In order to eliminate this shortcoming, in 2009, Liu et al. [10] first proposed a provable secure proxy signature with revocation in the standard model.
For the lack of formal security definitions, many early schemes were proven insecure later. Therefore, security notion and security concept are important for designing the proxy signature schemes. In 2003, Boldyreva et al. [22] first defined the security model of proxy signature schemes. Although their model is efficient, it has received many criticisms, since the security of their model is unable to describe the security in the standard model. Consequently, their scheme is proved secure in the random oracle model, but it is vulnerable to the proxy key exposure attack. So, it is an interesting problem to design a proxy signature scheme, which can be proven secure in the standard model and avoid the proxy key exposure attack. In 2006, Huang et al. [4] divided the attackers into three types to make the security model much clearer and proposed a secure proxy signature in the standard model. Based on Huang et al.'s scheme and Waters' technique, Liu et al. [10] proposed a formal security model for proxy signature with fast revocation in the standard model. After that, many proxy signature schemes with revocation in the standard model have been proposed [10–13], and they are demonstrated by using a 2-level hierarchical Waters signature. However, there are two drawbacks in these schemes [10–12]. One is that they have a large number of public parameters, and the other is that they are not strongly unforgeable since an adversary is still able to forge a valid signature on the same message without the private key after the proxy signer is revoked.
Later, many new schemes were proposed. In 2013, Kim et al. [23] and Swapna et al. [24] constructed the provably secure ID-based proxy signature schemes based on the lattice problems, respectively and independently, but these schemes increased the length of the proxy private key significantly. In 2014, Hu et al. [25] presented a novel ID-based proxy signature scheme, and the proposed scheme is provably secure in the standard model. In the same year, Cao et al. [26] also presented a weak blind signature scheme by combing the requirements for proxy signature and weak blind signature. Unfortunately, Zhang and Jia [27] found that there exists a security problem in Cao et al.'s scheme. That is to say, the receiver of the signature can forge a valid signature on any message without being perceived, and at the same time, Zhang and Jia provided the detailed attack strategy and the possible improved schemes.
The existing proxy signature schemes are existentially unforgeable under adaptive chosen-message attacks and adaptive chosen-warrant attacks, which means that an adversary should not be able to produce a valid signature for a new message. However, most existing signature schemes are randomized and may produce some valid signatures for the same message, because they do not have the property of strong unforgeability, which is desirable in some applications [28]. A scheme is said to be strongly unforgeable if it is existentially unforgeable under adaptive chosen message attacks and an adversary cannot generate a different valid signature on the same message. Although strong unforgeability is an important property of proxy signature schemes, there are few proxy signatures that possess the property of strong unforgeability in the standard model because of the malleability of Waters' signature. In 2011, Sun et al. [7] proposed the first strongly unforgeable proxy signature in the standard model with the Waters' scheme and Boneh et al. [29]. This scheme shows the formal security of a strongly unforgeable proxy signature. However, Sun et al. could not solve the revocation problem of delegated rights described above.
Overall, although fast revocation has been taken into account in several proxy signature schemes, these schemes do not possess strong unforgeability. Therefore, a strongly unforgeable proxy signature with fast revocation in the standard model is an interesting topic. We need to construct a strongly unforgeable proxy signature with revocation under the computational Diffie-Hellman assumption. Our scheme is based on Sun et al.'s work [7] and the SEM revocation mechanism [19–21].
3. Preliminaries
Before introducing our scheme, we shall briefly introduce the difficult problems and security models related to our scheme. Notations used throughout the paper are summarized in Table 1.
Notations.
3.1. Hard Problems
The security of the proposed scheme is based on the hardness of the well-known hard mathematical problem, the computational Diffie-Hellman problem.
Definition 1 (computational Diffie-Hellman (CDH) problem in G).
Given
Definition 2 (computational Diffie-Hellman (CDH) assumption in G).
Given
3.2. Algorithm Model
In this section, we will give the outline of a strongly unforgeable proxy signature with fast revocation. There exist three parties: an original signer Alice shorted by A, a proxy signer Bob shorted by B, and a security mediator SEM shorted by S, which is an online partial third server, introduced to check whether the proxy signer signs a message according to the warrant or he/she exists on the revocation list. B is picked by A. For other entities, S is supposed to be a partially trusted third party, who has to perform this protocol strictly. A proxy signature scheme with fast revocation consists of the following algorithms.
(1) Setup. Given the system security parameter, this algorithm outputs the system parameter π, which is publicly known.
(2) Key-Gen. Given π, this algorithm generates a private-public key pair (
(3) Delegation-Gen. Given π, the private key of A
(4) Delegation-Verify. After receiving (
(5) Proxy-Valid. B wants to sign a message M. S must guarantee that the period of proxy delegation specified in the warrant ω is valid, and B is not on the public revocation list.
(6) ProxySign-Gen. Given π, a warrant ω, a message M, two delegation keys
(7) ProxySign-Verify. Given π, a warrant ω, a message M, the signature σ, and the public keys
(8) Proxy-Revocation. If A wants to revoke the delegation of B before the specific delegation period expires, he/she asks S to put (
3.3. Security Models
For proxy signature schemes, the first security model was proposed by Mambo et al. [15]. However, this model was vulnerable to proxy key exposure attacks. In order to avoid proxy key exposure attacks, Huang et al. [4] provided a new security model of proxy signatures, where adversaries are divided into three types to make the security model much clearer. We modified this model a little to make it adapt to our scheme and strengthen its strong unforgeability of proxy signature. Three types of adversaries are shown as follows.
Type I. Adversary
Type II. Adversary
Type III. Adversary
Clearly, if a proxy signature scheme is strongly unforgeable against type II and type III adversaries, it is also strongly unforgeable against type I. Therefore, if we show that our scheme is strongly unforgeable against type II and type III adversaries, it means that our scheme is strongly unforgeable against all three types of adversaries. In the following security model, we only consider the type II adversary
3.3.1. Strong Existential Unforgeability against the Adaptive
Adversary
The strong unforgeability of the proxy signature scheme with fast revocation under
SEM-Delegation queries: User-Delegation queries: SEM-Sign queries: User-Sign queries: Finally,
(
The advantage of an adversary
Definition 3.
An adversary
3.3.2. Strong Existential Unforgeability against Adaptive
Adversary
The strong unforgeability of the proxy signature scheme with fast revocation under an C runs the Setup algorithm to obtain system's parameters π and runs the Key-Gen algorithm to obtain A's private/public key pair (
User-Sign queries: Finally,
(
The advantage of an adversary
Definition 4.
An adversary
4. The Proposed Scheme
In this section, we shall introduce the strongly unforgeable proxy signature scheme with fast revocation in the standard model in detail, and this scheme is based on the existing works [5, 14]. Waters et al.'s scheme [14] is a basic algorithm prototype of Sun et al.'s scheme [5], and Sun et al. proposed the first proxy signature scheme based on Waters et al.'s model. Unfortunately, their schemes were proved to be insecure later [7]. So we analyzed their schemes and proposed a new proxy signature scheme with fast revocation, and this is our main contribution. Let A denote the original signer Alice, B denote the proxy signer Bob, and S denote the security mediator SEM who is an online partially trusted server. In the following, all the warrants to be signed will be regarded as a bit string of length n. Note: to construct a more flexible scheme which allows warrants of arbitrary length, a collision resistant hash function

The proposed proxy signature scheme with revocation.
(1) Setup. Let (
(2) Key-Gen. A randomly picks
(3) Delegation-Gen. The warrant ω is signed by A and contains important information such as valid time of delegation of the signing rights, the identities of the original signer and the proxy signer, and other information of the delegation. Let
(4) Delegation-Verify. To confirm the correctness of (
Similarly, S verifies the above equation by
(5) Proxy-Valid. To produce a proxy signature on a message M, B has to cooperate with S. B transmits his identity and ( The period of proxy delegation specified in the warrant ω should be valid. (
If the two conditions hold, S can perform the ProxySign-Gen stage.
(6) ProxySign-Gen. Let M be an n-bit message. The proxy signer has to cooperate with S to generate a proxy signature on M.
S randomly chooses B checks whether the following equation holds:
If yes, B chooses two random values
(7) ProxySign-Verify. The verifier verifies whether the proxy signature σ on the message M is valid by judging whether the following equation holds:
(8) Proxy-Revocation. When a valid delegation period expires or A wants to revoke a valid delegation ahead of schedule for some reason, she asks S to put (
5. Correctness and Security
5.1. Correctness
Theorem 5.
The delegation verification algorithm in our algorithm is correct.
Proof.
In our algorithm, we have
Theorem 6.
The proxy signature verification algorithm in our algorithm is correct.
Proof.
In our algorithm, we have the equations
So, we prove the correctness of the proxy signature in the following way:
5.2. Security
The proposed scheme satisfies the security requirements of verifiability, strong identifiability, strong undeniability, and prevention of misuse, which can be briefly explained as follows:
Theorem 7.
If there exists a type
Proof.
Assume that C receives a random CDH problem instance (
(i) Setup. Let an integer k ( an integer an integer
For the ease of analysis, the following functions are defined:
Then, C assigns a set of public parameters as follows:
C sets the public key of the original signer C randomly picks two values C sets C assigns
Note that under the assignment
(ii) C runs
(1) SEM-Delegation Query. C first selects two random integers
(2) User-Delegation Query. If
Let
Additionally,
C computes
If
(3) SEM-Sign Query. C first chooses four random integers
(4) User-Sign Query. C chooses three integers
We will prove the correctness of the proxy signature as follows:
(iii) If C does not abort during the simulation, the adversary will return a proxy signature
This completes the description of the simulation. Now we have to assess C's probability of success. C will not abort if the following conditions hold.
The success probability is
Therefore,
Algorithm C's running time equals
Theorem 8.
The strongly unforgeable proxy signature with fast revocation is
Proof.
This proof is similar to that of Theorem 7 and thus we omit the detailed proof to save space. Here, we only illustrate the differences between them. First, we recall the capacity of adversary
From Theorems 7 and 8, it can be seen that the proposed scheme can prevent Type II or Type III attacks; that is to say, our scheme has the strong unforgeability in the standard model. In fact, the reason why the existing proxy signature schemes with revocation cannot achieve the strong unforgeability results from their design method. From the aspect of the algorithm construction mechanism, the existing schemes can be regarded as 2-level hierarchical Waters' signature. However, Waters et al.'s scheme is malleable [5, 14], in which an adversary can generate a different valid signature on the same message even without the private key. In more details, in Waters' signature, we suppose that the signature of a message is denoted by
5.3. Comparison with Existing Schemes
In this section, we will compare our scheme with other existing proxy signature schemes [3–12] in terms of the number of the public parameters, the size of the signature, the computational efficiency of the delegation stage, the proxy sign stage, and proxy sign verification stage. In order to facilitate the description, we define the symbols shown in Table 2.
Symbol meaning.
First, we will discuss the proxy signature process. In the proposed scheme, we consider the computational complexity. In order to delegate the proxy signer, the scheme needs 7 exponentiation operations in G, and
Proxy signature scheme efficiency comparison.
Size: length of signature. Parameter: the number of system public parameters.Delegation: the computational efficiency in the Delegation-Gen phase. ProxySign: the computational efficiency in the ProxySign-Gen phase. Verify: the computational efficiency in the ProxySign-Verify phase.
Compared to existing schemes, our scheme has some advantages that other schemes do not have. Moreover, as we all know, if pairing operations are executed by sensor nodes, it would affect the efficiency of the sensor networks. But from Table 3, we can know that just ProxySign-Verify needs 5 pairing operations, and it should be executed by a sink node or one proxy equipment but not sensor nodes, so the pairing operations will not affect the efficiency of sensor-based network systems.
The merit/demerit comparison between the existing schemes and our scheme is summarized in Table 4.
Comparison of merits and demerits.
F.R: whether the proxy signature can achieve fast revocation. S.M: whether the scheme has security proof in the standard model. S.U: whether the scheme is strongly unforgeable.
From Table 4, we can see that
Overall, compared with other proxy signatures [3–12] in the standard model, our scheme has stronger security because it has strong unforgeability and has low storage requirement because it has a shorter system parameter. At the same time, the scheme can achieve fast revocation.
6. Conclusions
Until now, none of the existing proxy signature schemes with revocation possesses strong unforgeablility. This leads to the fact that the adversary can even produce a new signature for a signed message, which makes the existing schemes insecure. In order to solve this security problem, this paper improves the situation and proposes a strongly unforgeable proxy signature with revocation under the computational Diffie-Hellman assumption in the standard model. The proposed scheme satisfies all of the security requirements for proxy signature schemes. Through a security analysis, we show that the proposed scheme is secure in the standard model and it can resist those attacks mentioned above. Furthermore, compared with several proxy signature schemes in the standard model, it is easy to conclude that the proposed scheme has advantages over other schemes, namely, stronger security and shorter system parameters. As a special kind of digital signature, the proxy signature has been widely applied in electronic commerce. With improvement of the proxy signature with revocation, the proposed scheme can be widely used in more applications, such as mobile agent and electronic transactions.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grant nos. 61473214, 61103178, and 61103199, Natural Science Basic Research Plan in Shaanxi Province of China under Grant nos. 2015JM6294, 2014JQ8360, and 2014JQ8324, the Fundamental Research Funds for the Central Universities under Grant no. 3102015JSJ0003, Basic Science Research Fund in Xidian University, and the 111 Project of China under Grant no. B08038.
