A Proxy Signature Scheme Based on Coding Theory

  • Hoda Jannati
  • Abolfazl Falahati
Part of the Communications in Computer and Information Science book series (CCIS, volume 92)


Proxy signature helps the proxy signer to sign messages on behalf of the original signer. This signature is used when the original signer is not available to sign a specific document. In this paper, we introduce a new proxy signature scheme based on Stern’s identification scheme whose security depends on syndrome decoding problem. The proposed scheme is the first code-based proxy signature and can be used in a quantum computer. In this scheme, the operations to perform are linear and very simple thus the signature is performed quickly and can be implemented using smart card in a quite efficient way. The proposed scheme also satisfies unforgeability, undeniability, non-transferability and distinguishability properties which are the security requirements for a proxy signature.


code-based signature proxy signature Stern’s identification syndrome decoding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Berlekamp, E., McEliece, R., Tilborg, H.: On the Inherent Intractability of Certain Coding Problems. IEEE Transactions on Information Theory 24, 384–386 (1978)zbMATHCrossRefGoogle Scholar
  2. 2.
    Cayrel, P.-L., Gaborit, P., Prouff, E.: Secure Implementation of the Stern Authentication and Signature Schemes for Low Resource Devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 191–205. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Courtois, N., Finiasz, M., Sendrier, N.: How to achieve a MCEliece-based Digital Signature Scheme. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 157–174. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)Google Scholar
  5. 5.
    Hamdi, O., Harari, S., Bouallegue, A.: Secure and Fast Digital Signatures using BCH Codes. International Journal of Computer Science and Network Security 6(10), 220–226 (2006)Google Scholar
  6. 6.
    Jannati, H., Salmasizadeh, M., Mohajeri, J.: New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. In: International Conference on Security and Management, pp. 238–242. SAM, Las Vegas (2008)Google Scholar
  7. 7.
    Lu, R., Cao, Z., Zhou, Y.: Proxy Blind Multi-Signature Scheme Without a Secure Channel. Journal of Applied Mathematics and Computation 164(1), 179–187 (2005)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy Signatures for Delegating Signing Operation. In: Conference on Computer and Communications Security - CCS 1996, pp. 48–57. ACM Press, New York (1996)CrossRefGoogle Scholar
  9. 9.
    McEliece, R.-J.: A Public-Key Cryptosystem Based on Algebraic Coding Theory. DSN Prog. Rep., Jet Propulsion Laboratory, California Inst. Technol., Pasadena, CA, pp. 114-116 (January 1978)Google Scholar
  10. 10.
    Melchor, C.-A., Cayrel, P.-L., Gaborit, P.: A New Efficient Threshold Ring Signature Scheme based on Coding Theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 1–16. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  11. 11.
    Stern, J.: A New Identification Scheme Based on Syndrome Decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13–21. Springer, Heidelberg (1994)Google Scholar
  12. 12.
    Wang, G., Bao, F., Zhou, J., Deng, R.-H.: Comments on a Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transaction on Knowledge and data Engineering 16(10), 1309–1311 (2004)CrossRefGoogle Scholar
  13. 13.
    Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Hoda Jannati
    • 1
  • Abolfazl Falahati
    • 1
  1. 1.Department of Electrical Engineering (DCCS Lab)Iran University of Science and TechnologyTehranIran

Personalised recommendations