Advertisement

Secure and Efficient Scheme for Delegation of Signing Rights

  • Rajeev Anand Sahu
  • Vishal SaraswatEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8958)

Abstract

A proxy signature scheme enables a signer to transfer its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. Multi-proxy signature is a proxy signature primitive which enables a user to transfer its signing rights to a group of proxy signers in such a way that every member of the authorized group must “participate” to sign a document on behalf of the original signer. We propose an efficient and provably secure identity-based multi-proxy signature scheme from bilinear map based on the hardness of the computational Diffie-Hellman problem. The proposed scheme is proved secure against adaptive chosen message and adaptive chosen-ID attack in random oracle model under the computational Diffie-Hellman assumption. Moreover, we do an efficiency comparison with the existing identity-based multi-proxy signature schemes and show that our scheme is upto 56 % more efficient in computation than the existing schemes.

Keywords

Identity-based cryptography Digital signature Bilinear map Multi-proxy signature Provably secure CDHP 

Notes

Acknowledgement

The authors acknowledge the Cryptology Research Society of India and DST-CMS project SR/S4/MS:516/07 for the financial support towards presentation of this paper at ICICS 2014.

References

  1. 1.
    Asaar, M.R., Salmasizadeh, M., Susilo, W.: Security pitfalls of a provably secure identity-based multi-proxy signature scheme. IACR Cryptology ePrint Archive, 2014:496 (2014)Google Scholar
  2. 2.
    Bakker, A., Van Steen, M., Tanenbaum, A.S.: A law-abiding peer-to-peer network for free-software distribution. In Proceedings of IEEE International Symposium on Network Computing and Applications, pp. 60–67 (2002)Google Scholar
  3. 3.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57–115 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)CrossRefzbMATHGoogle Scholar
  5. 5.
    Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)CrossRefzbMATHGoogle Scholar
  6. 6.
    Debiao, H., Jianhua, C., Jin, H.: An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)CrossRefGoogle Scholar
  7. 7.
    Foster, L.T., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computer and Communications Security, pp. 83–92 (1998)Google Scholar
  8. 8.
    Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC 1989, pp. 305–319 (1989)Google Scholar
  9. 9.
    Herranz, J., Sáez, G.: Revisiting fully distributed proxy signature schemes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 356–370. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  10. 10.
    Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS 2000, 138 (2000)Google Scholar
  11. 11.
    Leiwo, J., Hänle, C., Homburg, P., Tanenbaum, A.S.: Disallowing unauthorized state changes of distributed shared objects. In: SEC, pp. 381–390 (2000)Google Scholar
  12. 12.
    Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  14. 14.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)Google Scholar
  15. 15.
    MIRACL. Multiprecision integer and rational arithmetic cryptographic library. http://certivox.org/display/EXT/MIRACL
  16. 16.
    Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: Efficient ID-based multi-proxy signature scheme from bilinear pairing based on k-plus problem. In: Hruschka Jr., E.R., Watada, J., do Carmo Nicoletti, M. (eds.) INTECH 2011. CCIS, vol. 165, pp. 113–122. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  17. 17.
    Neuman, B.C.: Proxy-based authorization and accounting for distributed systems. In: ICDCS, pages 283–291 (1993)Google Scholar
  18. 18.
    Okamoto, T., Tada, M., Okamoto, E.: Extended proxy signatures for smart cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, p. 247. Springer, Heidelberg (1999) CrossRefGoogle Scholar
  19. 19.
    Rao, B.U., Reddy, P.V.: ID-based directed multi-proxy signature scheme from bilinear pairings. Int. J. Comput. Sci. Secur. (IJCSS) 5(1), 107 (2011)Google Scholar
  20. 20.
    Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28, 497–512 (2013)CrossRefGoogle Scholar
  21. 21.
    Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  22. 22.
    Varadharajan, V., Allen, P., Black, S.: An analysis of the proxy problem in distributed systems. In: IEEE Symposium on Security and Privacy, pp. 255–277 (1991)Google Scholar
  23. 23.
    Wang, Q., Cao, Z., Wang, S.: Formalized security model of multi-proxy signature schemes. In: CIT 2005, pp. 668–672 (2005)Google Scholar
  24. 24.
    Xiong, H., Jianbin, H., Chen, Z., Li, F.: On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2), 129–135 (2011)CrossRefzbMATHGoogle Scholar
  25. 25.
    Yap, W.-S., Goi, B.-M.: Forgery attacks of an identity-based multi-proxy signature scheme. International Journal of Communication Systems, February 2014Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.C.R.Rao Advanced Institute of Mathematics Statistics and Computer ScienceHyderabadIndia

Personalised recommendations