Wireless Personal Communications

, Volume 103, Issue 2, pp 1273–1283 | Cite as

One Secure Attribute-Based Proxy Signature

  • Changxia Sun
  • Yufeng Guo
  • Yanling LiEmail author


Attribute-based cryptography has drawn much attention due to its unique advantages and has gained many achievements over the years. Proxy signature allows that people need to delegate some of their signing rights to a reliable agent (that is, a proxy signer), and let proxy signer exercise such powers on his behalf. Here, a new attribute-based proxy signature with large universal attributes is proposed. The original signer delegates some of their signing rights to a proxy signer with some special attributes, then proxy signer can sign some message in the name of the original signer. We firstly give the formal syntax of an attribute-based proxy signature and the formal security model in the random oracle. The scheme is secure through detailed analysis. The scheme has the secure requirements of proxy signature system as following, distinguishability, verifiability, strong unforgeability, strong non-repudiation, strong identifiability, abuse resistance. In addition, the scheme is resistant to the collusion attack required in the attribute-based signature system.


Attribute-based Proxy signature Original signer Proxy signer CDH problem 



This work was supported partially by Henan Province Key Science-technology Research Project under Grant No. 162102210109, Henan Province Major Science-technology Project under Grant No. 131100110400-04, Science-technology Research Key Project of Henan Province Education Department under Grant No. 14B413009, and Science-technology Research Project of Zhengzhou city under Grant No. 141PPTGG431.


  1. 1.
    Shamir, A. (1984). Identity-base cryptosystems and signatures schemes. In Proceedings of the Crypto’84, LNCS 196 (pp. 47–53). Springer.Google Scholar
  2. 2.
    Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology, Eurocrypt, LNCS 3494 (pp. 457–473). Springer.Google Scholar
  3. 3.
    Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS’06 (pp. 89–98). New York: ACM Press.Google Scholar
  4. 4.
    Khader, D. (2007). Attribute based group signatures. Cryptology ePrint archive, report 2007/159.
  5. 5.
    Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint archive, report 2008/328.
  6. 6.
    Guo, S., & Zeng, Y. (2008). Attribute-based signature scheme. In Conference of information security and assurance (ISA2008) (pp. 509–511). Xi’an: Xi’an Electronic Science & Technology University Press.Google Scholar
  7. 7.
    Li, J., & Kim, K. (2008). Attribute-based ring signatures. Cryptology ePrint archive, report 2008/394.
  8. 8.
    Yang, P., Cao, Z., & Dong, X. (2008). Fuzzy identity based signature. Cryptology ePrint archive, report 2008/002.
  9. 9.
    Shahandashti, S. F., & Safavi-Naini, R. (2009). Threshold attribute-based signatures and their application to anonymous credential systems. In AFRICACRPT’2009 (pp. 198–216). Berlin: Springer.CrossRefGoogle Scholar
  10. 10.
    Li, J., Au, M. H., Susilo, W., Xie, D., & Renal, K. (2010). Attribute-based signatures and its applications. In ASIACC’10 2010, Beijing, China (pp. 978–987). Copyright 2010 ACM.Google Scholar
  11. 11.
    Li, J., & Kim, K. (2010). Hidden attribute-based signatures without anonymity revocation. Information Sciences: an International Journal, 180, 1681–1689.MathSciNetCrossRefGoogle Scholar
  12. 12.
    Chang-xia, S. U. N., Wen-ping, M. A., & He-feng, C. H. E. N. (2010). Multi-authority attribute-based signature. Journal of Sichuan University (Engineering Science Edition), 43(1), 83–86.MathSciNetGoogle Scholar
  13. 13.
    Sun, C. X., Ma, W. P., et al. (2012). Secure attribute-based threshold signature without a trusted central authority. Journal of Computer, 7(12), 2899–2905.CrossRefGoogle Scholar
  14. 14.
    Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures for delegating signing operation. In 3rd AC-conference on computer and communications security (CCS’96) (pp. 8–57). NewYork: AC-Press.Google Scholar
  15. 15.
    Xu, J., Zhang, Z., Feng, D. (2005). ID-based proxy signature using bilinear pairings. In Proceedings of the third international symposium on parallel and distributed processing and applications (pp. 359–367). Berlin: Springer.CrossRefGoogle Scholar
  16. 16.
    Wu, W., Mu, Y., Susilo, W. et a1. (2007). Identity-based proxy signature from pairings. In Proceedings of the 4th international conference on autonomic and trusted computing (pp. 22–31). Heidelberg: Springer.Google Scholar
  17. 17.
    Ji, H. F., Han, W. B., Zhao, L., Wang, Y. J. (2009). An identity-based proxy signature from bilinear pairings. In WASE international conference on information engineering (pp. 14–17).Google Scholar
  18. 18.
    Chai, Zhen-chuan, Cao, Zhen-fu, & Lu, Rong-xing. (2006). An efficient provable secure id-based proxy signature scheme based on cdh assumption. Journal of Shanghai Jiaotong University (Science), 11(3), 271–278.zbMATHGoogle Scholar
  19. 19.
    Li, M. X., Han, B. T., Zhu, J. Y., Zheng, X. F., & Yan, P. (2009). Identity-based proxy signature scheme secure in standard model. Journal of South China University of Technology (Natural Science Edition), 37(5), 118–123.Google Scholar
  20. 20.
    Cocks, C. (2001). An identity based encryption scheme based on quadratic residues. In IMA international conference (pp. 360–363).CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Department of Information and Management Sciences CollegeHenan Agricultural UniversityZhengzhouChina

Personalised recommendations