| With the development of the network,the cross-domain exchange of data has become more and more common,but it also faces the risk of malicious code such as Trojan horse viruses being entrained in the process of cross-domain exchange.How to ensure the security of data and share data is an urgent need at present.Therefore,this article proposes an identitybased proxy re-signature without bilinear pairs and an identity-based proxy re-signature based on ideal lattice for the existing problems and security risks in the current cross-domain data security exchange process.Specifically,this article uses proxy re-signature technology to convert user A’s signature into user B’s signature.The proxy re-signature technology is used in the process of data security exchange.(1)Build an identity-based proxy re-signature scheme without bilinear pairs.This solution uses the technology of constructing a user key based on the user’s identity to avoid the complicated digital certificate management process in the traditional signature solution,reduce the storage requirement of the solution and improve the operating efficiency of the solution.At present,most identity-based signature schemes are constructed based on the bilinear pairing,but the calculation of bilinear pairing has a high computational complexity,which makes the calculation efficiency of the scheme using bilinear pairing construction not high.In response to this problem,this scheme is constructed based on the square root problem,which further improves the calculation efficiency of the scheme.(2)Constructed an identity proxy re-signature scheme based on ideal lattice.This scheme uses an ideal lattice to construct,which can resist quantum attacks,and uses an ideal lattice and an efficient trapdoor structure to improve the computational efficiency of the scheme and reduce storage requirements.It also uses the method of constructing a user key based on the user’s identity.Reduce the storage burden and computing overhead of the server.(3)The correctness analysis and security analysis of the above two schemes prove that the scheme is unforgeable against adaptive selection message attacks and identity attacks under random oracles.In summary,the two schemes proposed in this paper have high practical application value. |