Heng Guo , Kun Tian , Fengxia Liu , Zhiyong Zheng , Yanan Wang
{"title":"Identity-based linearly homomorphic proxy signature scheme","authors":"Heng Guo , Kun Tian , Fengxia Liu , Zhiyong Zheng , Yanan Wang","doi":"10.1016/j.comnet.2025.111703","DOIUrl":null,"url":null,"abstract":"<div><div>Currently, the construction of linearly homomorphic proxy signature schemes is quite limited, and existing schemes lack both resistance to quantum attacks and mechanisms for public key identity protection. To address these issues, this paper proposes and constructs, for the first time, an identity-based linearly homomorphic proxy signature scheme. This scheme serves as a general construction framework capable of extending any secure identity-based proxy signature into an identity-based linearly homomorphic proxy signature. Furthermore, for adversaries with varying attack capabilities, we rigorously prove the security of the scheme in the standard model, with its security strictly relying on the Short Integer Solution (SIS) problem. To demonstrate the practical value of our scheme, at the end of this paper, we present a specific application scenario in cloud computing data auditing.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111703"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006693","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, the construction of linearly homomorphic proxy signature schemes is quite limited, and existing schemes lack both resistance to quantum attacks and mechanisms for public key identity protection. To address these issues, this paper proposes and constructs, for the first time, an identity-based linearly homomorphic proxy signature scheme. This scheme serves as a general construction framework capable of extending any secure identity-based proxy signature into an identity-based linearly homomorphic proxy signature. Furthermore, for adversaries with varying attack capabilities, we rigorously prove the security of the scheme in the standard model, with its security strictly relying on the Short Integer Solution (SIS) problem. To demonstrate the practical value of our scheme, at the end of this paper, we present a specific application scenario in cloud computing data auditing.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.