Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(117.8KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
B.Umaprasada Rao, P.Vasudeva Reddy
Pages - 107 - 117     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Public Key Cryptography, Proxy Signature Scheme, Multisignature Scheme, Proxy Signature Scheme , Bilinear Pairing, CDH Problem
ABSTRACT
Abstract In a multi-proxy signature scheme, an original signer delegates his signing power to a group of proxy signers. Then the group of proxy signers cooperatively generates a multi-proxy signature on behalf of the original signer; and any one can verify the validity of the multi-proxy signature. But, when the signed message is sensitive to the signature receiver, it is necessary to combine the concepts of multi-proxy signatures with directed signatures. In this paper, we propose an identity based directed multi-proxy signature scheme using bilinear pairings. This scheme allows a group of proxy signers to generate a valid multi-proxy signature to a designated verifier. The designated verifier can only directly verify the multi-proxy signature generated by a group of proxy signers issued to him on behalf of the original signer and, in case of trouble or if necessary, he can convince any third party about the validity of the signatures. Finally, we discuss the correctness and security analysis of the proposed scheme.
CITED BY (8)  
1 Ye, F., Qian, Y., & Hu, R. Q. (2015). HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. Security and Communication Networks.
2 Aboud, S., & Al-fayoumi, M. (2012). proxy signature scheme for warrant partial delegation. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012) (pp. 107-113). The Society of Digital Information and Wireless Communication.
3 Sahu, R. A., & Saraswat, V. (2014). Secure and Efficient Scheme for Delegation of Signing Rights. In Information and Communications Security (pp. 258-273). Springer International Publishing.
4 Chen, B. C., & Yeh, H. T. (2013). Secure proxy signature schemes from the Weil pairing. The Journal of Supercomputing, 65(2), 496-506.
5 Left flat, Yunfang, Wangsan Fu, & Wang ya. (2013). A new proxy signature scheme without certificate directional Computer Applications and Software, 30 (2), 315-316.
6 Yuhong Zhen, Wu Yonghao, & Zhou Fengli. (2013). Based on vehicle terminal system design µC / OS-? Computer Applications and Software, 30 (2), 324-327.
7 Hsu, C. L., & Lu, C. F. (2012). A security and privacy preserving e-prescription system based on smart cards. Journal of medical systems, 36(6), 3637-3647.
8 Aboud, S., & Yousef, S. (2012). a practical proxy signature scheme. International Journal of Digital Information and Wireless Communications (IJDIWC), 2(4), 27-36.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 refSeek
5 iSEEK
6 Libsearch
7 Bielefeld Academic Search Engine (BASE)
8 Scribd
9 SlideShare
10 PdfSR
1 M. Mambo, K. Usuda, and E.Okamoto. “Proxy Signatures for Delegating Signing Operation”. In: 3rd ACM Conference on Computer and Communications Security(CCS'9), pp.48-57, New York, ACM, 1996.
2 C.L Hsu, T.S. Wu and T.C. Wu. “New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers”. The Journal of Systems and Software, 58, pp.119-124, 2001.
3 M.S.Hwang, I.C. Lin and J.L. Lu Eric. “A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers”. International Journal of Informatica, 11(2), pp.1-8, 2000.
4 H.M. Sun. “An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers”. Computer Communications, 22(8), 1999, pp.717-722.
5 K. Zhang. “Threshold Proxy Signature Schemes”. Information Security Workshop, pp.191- 197, Japan, 1997.
6 J. Liu and S. Huang. “Identity-Based Threshold Proxy Signature from Bilinear Pairings”. Informatica, Inst. Math & Science, Vol. 21, No. 1, pp. 41-56, IOS press, 2010.
7 S.J. Hwang, and C. H. Shi. “A Simple Multi-Proxy Signature Scheme”. Proceeding of the Tenth National Conference on Information Security, Taiwan, pp.134-138, Techinical report, 2000.
8 X. Li, and K. Chen. “ID-based Multi-Proxy Signature, Proxy Multi-Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings”. Applied Mathematics Computation, Vol. 169, Issue 1, pp. 437-450, Elsevier, 2005.
9 X. Li, K. Chen, and S. Li. “Multi-Proxy Signature and Proxy Multi-Signature Schemes from Bilinear Pairings”. Proceedings of PDCAT 2004, LNCS 3320, pp. 591–595, Springer-Verlag, 2004.
10 L.Yi, G. Bai and G. Xiao. “Proxy Multi-Signature Scheme: A New Type of Proxy Signature Scheme”. Electronic Letters, Vol.36, No.6, pp.527-528, IEEE, 2000.
11 S. Lal and A. K. Awasthi. “Proxy Blind Signature Scheme”. IACR, Cryptology e-print Archive,Report 2003/072, 2003. http://eprint.iacr.org.
12 B. Majhi, D.K. Shau, and R.N. Subudhi. “An Efficient ID-Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature”. International conference on Information Technology, pp. 19-23, IEEE, 2008.
13 J.Hwang, and C. H. Chen. “A New Multi-Proxy Multi-Signature Scheme”, 2001 National Computer Symposium: Information Security, Taiwan, pp.19-26, 2001.
14 X. Li, and K. Chen. “ID-based Multi-Proxy Signature, Proxy Multi-Signature and Multi-Proxy Multi-Signature Schemes from Bilinear Pairings”. Applied Mathematics Computation, Vol. 169, Issue 1, pp. 437-450, Elsevier, 2005.
15 M. S. Hwang, S. F. Tzeng, S. F. Chiou. “An Ordered Multi-Proxy Multi- Signature Scheme”. Proceedings of the 8th International Conference on Intelligent Systems Design and Applications, Vol. 03, pp. 308-313, IEEE Computer Society, 2008.
16 Y.Sun, C. Xu, F.Li, and Y.Yu. “Identity Based Multi-Proxy Multi-Signcryption Scheme for Electronic Commerce”. Proceedings of the5th International Conference on Information Assurance and Security, Vol.02, pp. 281-284, IEEE, 2009.
17 Z. Xiaoyan, W.Yan, D .Wiefeng, and G. Yan. “An Improved ID-Based Multi-Proxy Multi- Signcryption Scheme”. Proceedings of the 2nd International Symposium on Electronic Commerce and Security, Vol.01, pp. 466-469, IEEE Computer Society, 2009.
18 S.J Hwang and C.C. Chen. “Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers”. INFORMATICA, 14(2), pp.205-212, 2003.
19 F. Li, Q. Xue, and Z. Cao “Bilinear pairings based designated-verifier multi-proxy signature scheme”, IT Revolutions, 2008 First Conference on, 2008.
20 S. Lal and M. Kumar. “A directed signature scheme and its applications”. Proceedings of National conference on Information Security, pp. 124-132, New York, 8-9 Jan, 2003.
21 R.Lu, X.Lim, Z.Cao, J.Shao and X.Liang, “New (t, n) threshold directed signatures schemes with provable security”, Information Sciences 178, pp.156-165,2008.
22 X. Sun, Jian-hua Li, Gong-liang Chen, and Shu-tang Yung. “Identity-Based Directed Signature Scheme from Bilinear Pairings”. Cryptology eprint Archive, Report 2008/305, 2008. http:// eprint.iacr.org.
23 B.Umaprasada Rao, P.Vasudeva Reddy, and T.Gowri. “An efficient ID-based DirectedSignature Scheme from Bilinear Pairings”. Cryptography e-print Archive Report 2009/617, Available at http://eprint.iacr.org.
24 A. Shamir. “Identity-based cryptosystems and signature schemes”. Advances in Cryptology- Crypto 84, LNCS 196, Springer-Verlag, pp.47-53, 1984.
25 D. Bonech and M. Franklin. “Identity Based Encryption from the Weil pairing”. Advance in CRYPTO’01, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
26 D. Boneh, B. Lynn, and H. Shacham. “Short signatures from the Weil pairing”. Advances in Cryptology-Asiacrypt’01, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
27 J.C. Cha and J.H. Cheon. “An identity-based signature from gap Diffie-Hellman groups”. Public Key Cryptography 03, LNCS 2139, pp.18-30, Springer-Verlag, 2003,.
28 F. Hess. “Efficient identity based signature schemes based on pairings”. SAC 02, LNCS 2595, pp. 310-324, Springer-Verlag, 2002.
29 F. Zhang and K. Kim. “ID-based blind signature and ring signature from pairings”. Advances in Cryptology-Asiacrypt 02, LNCS 2501, pp. 533-547, Springer-Verlag, 2002.
Dr. B.Umaprasada Rao
- India
buprasad@yahoo.co.in
Dr. P.Vasudeva Reddy
- India