Abstract
In a proxy re-signature scheme, a semi-trusted entity called proxy is capable of transforming Alice's signature on a message m into Bob's signature on m, with the help of some private information. In this paper, we have addressed the open problem of converting one type of signature into another, this was posed as an interesting issue by Ateniese and Honenberger in [1]. We propose a proxy re-signature scheme in which the proxy can convert a public key infrastructure (PKI) based signature of a user into an identity based (IDB) signature of the same user, we also propose an appropriate security model for the problem and prove the security of the scheme in random oracle model. In our scheme, the user provides some secret information to the proxy who is a semi-trusted entity facilitating the conversion process. The scheme we propose in this paper is single-use (the signature conversion is from PKI to IDB and not to another IDB or any other type of signature) and unidirectional (the signature conversion cannot be done from IDB to PKI).
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.