Secure and Efficient Scheme for Delegation of Signing Rights

  • Rajeev Anand Sahu
  • Vishal SaraswatEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8958)


A proxy signature scheme enables a signer to transfer its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. Multi-proxy signature is a proxy signature primitive which enables a user to transfer its signing rights to a group of proxy signers in such a way that every member of the authorized group must “participate” to sign a document on behalf of the original signer. We propose an efficient and provably secure identity-based multi-proxy signature scheme from bilinear map based on the hardness of the computational Diffie-Hellman problem. The proposed scheme is proved secure against adaptive chosen message and adaptive chosen-ID attack in random oracle model under the computational Diffie-Hellman assumption. Moreover, we do an efficiency comparison with the existing identity-based multi-proxy signature schemes and show that our scheme is upto 56 % more efficient in computation than the existing schemes.


Identity-based cryptography Digital signature Bilinear map Multi-proxy signature Provably secure CDHP 



The authors acknowledge the Cryptology Research Society of India and DST-CMS project SR/S4/MS:516/07 for the financial support towards presentation of this paper at ICICS 2014.


  1. 1.
    Asaar, M.R., Salmasizadeh, M., Susilo, W.: Security pitfalls of a provably secure identity-based multi-proxy signature scheme. IACR Cryptology ePrint Archive, 2014:496 (2014)Google Scholar
  2. 2.
    Bakker, A., Van Steen, M., Tanenbaum, A.S.: A law-abiding peer-to-peer network for free-software distribution. In Proceedings of IEEE International Symposium on Network Computing and Applications, pp. 60–67 (2002)Google Scholar
  3. 3.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57–115 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)CrossRefzbMATHGoogle Scholar
  5. 5.
    Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)CrossRefzbMATHGoogle Scholar
  6. 6.
    Debiao, H., Jianhua, C., Jin, H.: An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)CrossRefGoogle Scholar
  7. 7.
    Foster, L.T., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computer and Communications Security, pp. 83–92 (1998)Google Scholar
  8. 8.
    Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC 1989, pp. 305–319 (1989)Google Scholar
  9. 9.
    Herranz, J., Sáez, G.: Revisiting fully distributed proxy signature schemes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 356–370. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  10. 10.
    Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS 2000, 138 (2000)Google Scholar
  11. 11.
    Leiwo, J., Hänle, C., Homburg, P., Tanenbaum, A.S.: Disallowing unauthorized state changes of distributed shared objects. In: SEC, pp. 381–390 (2000)Google Scholar
  12. 12.
    Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Malkin, T., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  14. 14.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)Google Scholar
  15. 15.
    MIRACL. Multiprecision integer and rational arithmetic cryptographic library.
  16. 16.
    Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: Efficient ID-based multi-proxy signature scheme from bilinear pairing based on k-plus problem. In: Hruschka Jr., E.R., Watada, J., do Carmo Nicoletti, M. (eds.) INTECH 2011. CCIS, vol. 165, pp. 113–122. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  17. 17.
    Neuman, B.C.: Proxy-based authorization and accounting for distributed systems. In: ICDCS, pages 283–291 (1993)Google Scholar
  18. 18.
    Okamoto, T., Tada, M., Okamoto, E.: Extended proxy signatures for smart cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, p. 247. Springer, Heidelberg (1999) CrossRefGoogle Scholar
  19. 19.
    Rao, B.U., Reddy, P.V.: ID-based directed multi-proxy signature scheme from bilinear pairings. Int. J. Comput. Sci. Secur. (IJCSS) 5(1), 107 (2011)Google Scholar
  20. 20.
    Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28, 497–512 (2013)CrossRefGoogle Scholar
  21. 21.
    Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  22. 22.
    Varadharajan, V., Allen, P., Black, S.: An analysis of the proxy problem in distributed systems. In: IEEE Symposium on Security and Privacy, pp. 255–277 (1991)Google Scholar
  23. 23.
    Wang, Q., Cao, Z., Wang, S.: Formalized security model of multi-proxy signature schemes. In: CIT 2005, pp. 668–672 (2005)Google Scholar
  24. 24.
    Xiong, H., Jianbin, H., Chen, Z., Li, F.: On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(2), 129–135 (2011)CrossRefzbMATHGoogle Scholar
  25. 25.
    Yap, W.-S., Goi, B.-M.: Forgery attacks of an identity-based multi-proxy signature scheme. International Journal of Communication Systems, February 2014Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.C.R.Rao Advanced Institute of Mathematics Statistics and Computer ScienceHyderabadIndia

Personalised recommendations