Journal of Electronics (China)

, Volume 25, Issue 1, pp 108–114 | Cite as

Ring proxy signatures

Article

Abstract

Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an anonymous member from a set of potential signers. The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr’s signatures and two ID-based ring proxy signature schemes. The security analysis is provided as well.

Key words

Proxy signature Ring signature Ring proxy signature ID-based cryptography Bilinear parings 

CLC index

TP309.2 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. The 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 14–16, 1996, 48–57.Google Scholar
  2. [2]
    S. Kim, S. Park, and D. Won. Proxy signatures, revisited. The First International Conference on Information and Communication Security, Beijing, China, November 11–14, 1997, 223–232.Google Scholar
  3. [3]
    B. Lee, H. Kim, and K. Kim. Strong proxy signature and its applications. The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, January 23–26, 2001, 603–608.Google Scholar
  4. [4]
    S. J. Hwang and C. H. Shi. A simple multi-proxy signature scheme. The 10th National Conference on Information Security, Hwalein, Taiwan, China, May 4–6, 2000, 134–138.Google Scholar
  5. [5]
    L. Yi, G. Bai, and G. Xiao. Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 36(2000)6, 527–528.CrossRefGoogle Scholar
  6. [6]
    K. Zhang. Threshold proxy signature schemes. The First International Information Security Workshop, Ishikawa, Japan, September 17–19, 1997, LNCS 1396, 282–290.Google Scholar
  7. [7]
    S. Lal and A. K. Awasthi. Proxy blind signature scheme. http://eprint.iacr.org/2003/072/, April 16, 2003.
  8. [8]
    F. Zhang, R. Safavi-Naini, and C. Y. Lin. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2003/104/, May 25, 2003.
  9. [9]
    K. Shum and V. K. Wei. A strong proxy signature scheme with proxy signer privacy protection. The 11th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, USA, June 10–12, 2002, 55–56.Google Scholar
  10. [10]
    H. M. Sun and B. T. Hsieh. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection. The 37th Annual International Carnahan Conference on Security Technology, Taipei, Taiwan, China, October 14–16, 2003, 474–476.Google Scholar
  11. [11]
    K. Awasthi and S. Lal. ID-based ring signature and proxy ring signature schemes from bilinear pairings. http://eprint.iacr.org/2004/184/, August 6, 2004.
  12. [12]
    R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. Advances in Cryptology-Asiacrypt, Gold Coast, Australia, December 9–13, 2001, LNCS 2248, 552–565.Google Scholar
  13. [13]
    F. Zhang and K. Kim. ID-based blind signature and ring signature from pairings. Advances in Cryptology-Asiacrypt, Queenstown, New Zealand, December 1–5, 2002, LNCS 2501, 533–547.Google Scholar
  14. [14]
    D. Boneh, C. Gentry, B. Lynn, et al. Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-Eurocrypt, Warsaw, Poland, May 4–8, 2003, LNCS 2656, 416–432.Google Scholar
  15. [15]
    J. Herranz and G. Saez. Forking lemmas for ring signature schemes. Progress in Cryptology-Indocrypt, New Delhi, India, December 8–10, 2003, LNCS 2904, 266–279.Google Scholar
  16. [16]
    J. Herranz and G. Saez. New identity-based ring signature schemes. The International Conference on Information and Communications Security, Malaga, Spain, October 27–29, 2004, LNCS 3269, 27–39.Google Scholar
  17. [17]
    S. S. M. Chow, S. M. Yiu, and L. C. K. Hui. Efficient identity based ring signature. The Third International Conference on Applied Cryptography and Network Security, New York, USA, June 7–10, 2005, LNCS 3531, 499–512.Google Scholar

Copyright information

© Science Press 2008

Authors and Affiliations

  • Wei Baodian 
    • 1
    • 3
  • Zhang Fangguo 
    • 1
    • 3
  • Chen Xiaofeng 
    • 2
    • 3
  1. 1.Department of Electronics and Communication EngineeringSun Yat-Sen UniversityGuangzhouChina
  2. 2.Department of Computer ScienceSun Yat-Sen UniversityGuangzhouChina
  3. 3.Guangdong Key Laboratory of Information Security TechnologyGuangzhouChina

Personalised recommendations