Abstract
A proxy signature scheme permits a proxy signer to sign messages on behalf of an original signer. Proxy multi-signature is one of the proxy signature primitives, where a group of original signers delegate their signing rights to the same proxy signer. However, as yet, to our knowledge, an ID-based proxy multi-signature scheme from bilinear pairings based on inverse computational Diffie-Hellman problem (INV-CDHP) has not been proposed. In this paper, we present the above scheme using advantage of the ‘k-plus’ problem and give a detailed analysis of the same. Due to a single pairing computation in verification phase, the new scheme is more efficient in computational and timing sense than other available schemes. Moreover, the proposed scheme fulfills all the security requirements of a safe proxy signature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005)
Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Information Sciences 179, 292–302 (2009)
Delos, O., Quisquater, J.-J.: An Identity-Based Signature Scheme with Bounded Life-Span. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 83–94. Springer, Heidelberg (1994)
Du, H., Wen, Q.: An efficient Identity-based short signature scheme from bilinear pairings. In: International Conference on Computer Inteligency and Security (ICCIS 2007), pp. 725–729 (2007)
Hesss, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
He, D., Chen, J., Hu, J.H.: An ID-based proxy signature scheme without bilinear pairings. Annlas of Telecommunications (February 2011), doi:10.1007/s12243-011-0244-0
Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation 169, 437–450 (2005)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of The 2001 Symposium on Cryptography and Information Security (SCIS), pp. 603–608 (2001)
Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Transictions E85-A(2), 481–484 (2002)
Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures: delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)
Okamoto, T., Inomata, A., Okamoto, E.: A proposal of short proxy signature using pairing. In: Proceedings of International Conference on Information Technology Coding and Computing (ITCC 2005), pp. 631–635 (2005)
Paterson, K.G.: Id-based signatures from pairings on elliptic curves. Cryptology ePrint Archive, Report 2002/004 (2002), http://eprint.iacr.org/2002/004
Shao, Z.: Improvement of identity-based proxy multi-signature scheme. The Journal of Systems and Software 82, 794–800 (2009)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Smart, N.P.: An identity based authenticated key agreement protocol based on the weil pairing. Electronic Letters 38(13), 630–632 (2002)
Wang, Q., Cao, Z.: Security arguments for partial delegation with warrant proxy signature schemes. Cryptology ePrint Archive, Report 2004/315 (2002), http://eprint.iacr.org/2004/315
Wang, Q., Cao, Z.: Identity based proxy multi-signature. The Journal of Systems and Software 80, 1023–1029 (2007)
Wang, Q., Cao, Z., Wang, S.: Formalized security model of multi-proxy signature schemes. In: Proceedings of The fifth International Conference on Computers and Information Technology (CIT 2005), pp. 668–672. IEEE Computer Society (2005)
Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Communication Letters 7(2), 76–78 (2003)
Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters 36(6), 527–528 (2000)
Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)
Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Robert, H., Deng, R.H., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sahu, R.A., Padhye, S. (2011). New ID-Based Proxy Multi-signature from Pairings. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)