Ring proxy signatures
Article
First Online:
Received:
Revised:
- 30 Downloads
- 1 Citations
Abstract
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr’s signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well.
Key words
Proxy signature Ring signature Ring proxy signature ID-based cryptography Bilinear paringsCLC index
TP309.2Preview
Unable to display preview. Download preview PDF.
References
- [1]M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. The 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14–16, 1996, 48–57.Google Scholar
- [2]S. Kim, S. Park, and D. Won. Proxy signatures, revisited. The First International Conference on Information and Communication Security, Beijing, China, November 11–14, 1997, 223–232.Google Scholar
- [3]B. Lee, H. Kim, and K. Kim. Strong proxy signature and its applications. The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, January 23–26, 2001, 603–608.Google Scholar
- [4]S. J. Hwang and C. H. Shi. A simple multi-proxy signature scheme. The 10th National Conference on Information Security, Hwalein, Taiwan, China, May 4–6, 2000, 134–138.Google Scholar
- [5]L. Yi, G. Bai, and G. Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 36(2000)6, 527–528.CrossRefGoogle Scholar
- [6]K. Zhang. Threshold proxy signature schemes. The First International Information Security Workshop, Ishikawa, Japan, September 17–19, 1997, LNCS 1396, 282–290.Google Scholar
- [7]S. Lal and A. K. Awasthi. Proxy blind signature scheme. http://eprint.iacr.org/2003/072/, April 16, 2003.
- [8]F. Zhang, R. Safavi-Naini, and C. Y. Lin. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2003/104/, May 25, 2003.
- [9]K. Shum and V. K. Wei. A strong proxy signature scheme with proxy signer privacy protection. The 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, USA, June 10–12, 2002, 55–56.Google Scholar
- [10]H. M. Sun and B. T. Hsieh. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection. The 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, China, October 14–16, 2003, 474–476.Google Scholar
- [11]K. Awasthi and S. Lal. ID-based ring signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2004/184/, August 6, 2004.
- [12]R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. Advances in Cryptology-Asiacrypt, Gold Coast, Australia, December 9–13, 2001, LNCS 2248, 552–565.Google Scholar
- [13]F. Zhang and K. Kim. ID-based blind signature and ring signature from pairings. Advances in Cryptology-Asiacrypt, Queenstown, New Zealand, December 1–5, 2002, LNCS 2501, 533–547.Google Scholar
- [14]D. Boneh, C. Gentry, B. Lynn, et al. Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-Eurocrypt, Warsaw, Poland, May 4–8, 2003, LNCS 2656, 416–432.Google Scholar
- [15]J. Herranz and G. Saez. Forking lemmas for ring signature schemes. Progress in Cryptology-Indocrypt, New Delhi, India, December 8–10, 2003, LNCS 2904, 266–279.Google Scholar
- [16]J. Herranz and G. Saez. New identity-based ring signature schemes. The International Conference on Information and Communications Security, Malaga, Spain, October 27–29, 2004, LNCS 3269, 27–39.Google Scholar
- [17]S. S. M. Chow, S. M. Yiu, and L. C. K. Hui. Efficient identity based ring signature. The Third International Conference on Applied Cryptography and Network Security, New York, USA, June 7–10, 2005, LNCS 3531, 499–512.Google Scholar
Copyright information
© Science Press 2008