JISE


  [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]


Journal of Information Science and Engineering, Vol. 32 No. 6, pp. 1525-1539


Role-Based Signature and its Security Proof


FUCAI LUO1,3, CHANGLU LIN1,3 AND YAN ZHU2
1College of Mathematics and Computer Science
Fujian Normal University
Fuzhou, 350117 P.R. China

2School of Computer and Communication Engineering
University of Science and Technology Beijing
Beijing, 100083 P.R. China

3Fujian Provincial Key Laboratory of Network Security and Cryptology
Fujian Normal University
Fuzhou, 350007 P.R. China
E-mail: cllin@fjnu.edu.cn


    Role-Based Signature (RBS) allows users to sign messages on behalf of his roles under the widely adopted hierarchical Role-Based Access Control (RBAC) model, and the signatures are verified by using the public keys of the roles. In this paper, we firstly make some minor modifications on the role-based signature proposed by Zhu et al. [14]. The modified role-based signature is also based on the partial-order key hierarchy with respect to public key infrastructure, in which each user belongs to a role has a unique private-key to sign messages, and only the public keys of his roles can be used to verify the signatures. Furthermore, we define the formal security model and present a full security proof for the modified RBS using the Forking Lemma. Our proposed scheme is strong existentially unforgeable under the weak attack in the random oracles model. Its security depends on the strong Diffie-Hellman assumption.


Keywords: cryptography, security, role-key hierarchy, role-based signature, proof of security

  Retrieve PDF document (JISE_201606_07.pdf)