Advertisement

Efficient and Secure Many-to-One Signature Delegation

  • Rajeev Anand SahuEmail author
  • Vishal Saraswat
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9543)

Abstract

We propose an IBPMS scheme from pairings, which is more efficient in the sense of computation and operation time than the existing schemes. We also prove on random oracle that the propose d scheme is secure against existential forgery on adaptive chosen-message and adaptive-chosen ID attack under the k-CAA assumption. Additionally, our scheme fulfills all the security requirements of a proxy signature scheme. Moreover we do an efficiency analysis and show that our scheme is significantly more efficient than the existing IBPMS schemes in the sense of computation and operation time.

Keywords

Identity-based cryptography Digital signature Bilinear pairings Delegation of signing rights Proxy multi-signature k-CAA problem Provable security 

References

  1. 1.
    Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Hongzhen, D., Wen, Q.: An efficient identity-based short signature scheme from bilinear pairings. In: ICCIS 2007, pp. 725–729 (2007)Google Scholar
  3. 3.
    Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC 1989, pp. 305–319 (1989)Google Scholar
  4. 4.
    Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603–608 (2001)Google Scholar
  5. 5.
    Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)Google Scholar
  7. 7.
    Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85(2), 481–484 (2002)Google Scholar
  8. 8.
    Shao, Z.: Improvement of identity-based proxy multi-signature scheme. J. Syst. Softw. 82(5), 794–800 (2009)CrossRefGoogle Scholar
  9. 9.
    Wang, Q., Cao, Z.: Identity based proxy multi-signature. J. Syst. Softw. 80(7), 1023–1029 (2007)CrossRefGoogle Scholar
  10. 10.
    Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527–528 (2000)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.C.R.Rao Advanced Institute of Mathematics Statistics and Computer ScienceHyderabadIndia

Personalised recommendations