Skip to main content

New ID-Based Proxy Multi-signature from Pairings

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

  • 1086 Accesses

Abstract

A proxy signature scheme permits a proxy signer to sign messages on behalf of an original signer. Proxy multi-signature is one of the proxy signature primitives, where a group of original signers delegate their signing rights to the same proxy signer. However, as yet, to our knowledge, an ID-based proxy multi-signature scheme from bilinear pairings based on inverse computational Diffie-Hellman problem (INV-CDHP) has not been proposed. In this paper, we present the above scheme using advantage of the ‘k-plus’ problem and give a detailed analysis of the same. Due to a single pairing computation in verification phase, the new scheme is more efficient in computational and timing sense than other available schemes. Moreover, the proposed scheme fulfills all the security requirements of a safe proxy signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  4. Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Information Sciences 179, 292–302 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  5. Delos, O., Quisquater, J.-J.: An Identity-Based Signature Scheme with Bounded Life-Span. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 83–94. Springer, Heidelberg (1994)

    Google Scholar 

  6. Du, H., Wen, Q.: An efficient Identity-based short signature scheme from bilinear pairings. In: International Conference on Computer Inteligency and Security (ICCIS 2007), pp. 725–729 (2007)

    Google Scholar 

  7. Hesss, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. He, D., Chen, J., Hu, J.H.: An ID-based proxy signature scheme without bilinear pairings. Annlas of Telecommunications (February 2011), doi:10.1007/s12243-011-0244-0

    Google Scholar 

  9. Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation 169, 437–450 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of The 2001 Symposium on Cryptography and Information Security (SCIS), pp. 603–608 (2001)

    Google Scholar 

  11. Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Transictions E85-A(2), 481–484 (2002)

    Google Scholar 

  12. Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures: delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)

    Google Scholar 

  13. Okamoto, T., Inomata, A., Okamoto, E.: A proposal of short proxy signature using pairing. In: Proceedings of International Conference on Information Technology Coding and Computing (ITCC 2005), pp. 631–635 (2005)

    Google Scholar 

  14. Paterson, K.G.: Id-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/004 (2002), http://eprint.iacr.org/2002/004

  15. Shao, Z.: Improvement of identity-based proxy multi-signature scheme. The Journal of Systems and Software 82, 794–800 (2009)

    Article  Google Scholar 

  16. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  17. Smart, N.P.: An identity based authenticated key agreement protocol based on the weil pairing. Electronic Letters 38(13), 630–632 (2002)

    Article  MATH  Google Scholar 

  18. Wang, Q., Cao, Z.: Security arguments for partial delegation with warrant proxy signature schemes. Cryptology ePrint Archive, Report 2004/315 (2002), http://eprint.iacr.org/2004/315

  19. Wang, Q., Cao, Z.: Identity based proxy multi-signature. The Journal of Systems and Software 80, 1023–1029 (2007)

    Article  Google Scholar 

  20. Wang, Q., Cao, Z., Wang, S.: Formalized security model of multi-proxy signature schemes. In: Proceedings of The fifth International Conference on Computers and Information Technology (CIT 2005), pp. 668–672. IEEE Computer Society (2005)

    Google Scholar 

  21. Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Communication Letters 7(2), 76–78 (2003)

    Article  Google Scholar 

  22. Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters 36(6), 527–528 (2000)

    Article  Google Scholar 

  23. Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  24. Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  25. Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Robert, H., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sahu, R.A., Padhye, S. (2011). New ID-Based Proxy Multi-signature from Pairings. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics