Wuhan University Journal of Natural Sciences

, Volume 11, Issue 1, pp 193–197 | Cite as

A new ID-based proxy multi-signature scheme from bilinear pairings

  • Gu Chun-xiang
  • Pan Heng
  • Zhu Yue-fei
Web Information Security


ID-based public key cryptosystem can be a good alternative for certificate-based public key setting. This paper provides an efficient ID-based proxy multi-signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.

Key words

ID-based signature proxy multi-signature ID-based proxy multi-signature bilinear pairings provable security 

CLC number

TN 918 TP 309 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Shamir A. Identity-based Cryptosystems and Signature Schemes.Advances in Cryptology—CRYPTO'84 (LNCS 196). Berlin: Springer-Verlag, 1984. 47–53.Google Scholar
  2. [2]
    Boneh D, Franklin M. Identity-Based Encryption From The Weil Pairing.Advances in Cryptology—CRYPTO'01 (LNCS 2139). Berlin: Springer-Verlag, 2001. 213–229.Google Scholar
  3. [3]
    Cha J C, Cheon J H. An Identity-based Signature from Gap Diffie-Hellman Groups.Public Key Cryptography—PKC 2003 (LNCS 2567). Berlin: Springer-Verlag, 2002. 18–30.Google Scholar
  4. [4]
    Hess F. Efficient Identity Based Signature Schemes Based on Pairings.Selected Areas in Cryptography-SAC 2002 (LNCS 2595). Berlin: Springer-Verlag, 2002. 310–324.Google Scholar
  5. [5]
    Yi X. An Identity-Based Signature Scheme From the Weil Pairing.IEEE Communications Letters, 2003,7(2): 76–78.CrossRefGoogle Scholar
  6. [6]
    Zhang F, Kim K. Efficient ID-based Blind Signature And Proxy Signature from Bilinear Pairings.ACISP 03 (LNCS 2727). Berlin: Springer-Verlag, 2003. 312–323.Google Scholar
  7. [7]
    Mambo M, Usuda K, Okamoto E. Proxy Signatures for Delegating Signing Operation.3rd AC-Conference on Computer and Communications Security (CCS'96). New York: AC-Press, 1996. 48–57.Google Scholar
  8. [8]
    Yi L J, Bai G Q, Xiao G Z. Proxy Multi-Signature Scheme: A New Type of Proxy Signature Scheme.Electron Lett, 2000,36: 527–528.CrossRefGoogle Scholar
  9. [9]
    Li Ji-guo, Cao Zhen-fu, Zhang Yi-chen. Nonrepudiable Proxy-Ulti-Signature Scheme.Journal of Computer Science and Technology, 2003,18(3): 399–402.MathSciNetCrossRefGoogle Scholar
  10. [10]
    Pointcheval D, Stern J. Security Arguments For Digital Signatures and Blind Signatures.Journal of Cryptology, 2000,13(3): 361–369.MATHCrossRefGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.Network Engineering DepartmentInformation Engineering UniversityZhengzhou, HenanChina

Personalised recommendations