A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme

  • Haifeng Qian
  • Zhenfu Cao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)


A novel ID-based proxy-protected signature scheme based on identity information is presented in this paper. We review the concept ID-Based signature introduced by Shamir, define the security notion of an ID-Based signature. We also improve the Shamir’s ID-Based signature and prove its security under the proposed security notion. From the improved Shamir’s ID-Based signature scheme we construct an ID-Based proxy signature scheme, the security is based on the underlying ID-based signature scheme. Our scheme is efficient and easy to implement. The scheme simplifies the public key as the user’s id and can be easily applied to all the RSA-type cryptosystems.


proxy signature identity-based signature provably secure RSA random oracle model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bellare, M., Rogaway, P.: The exact security of digital signatures - how to sign with RSA and rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)Google Scholar
  2. 2.
    Boneh, D.: Twenty years of attacks on the RSA cryptosystem. In: Notices of the American Mathematical Society (AMS), vol. 46(2), pp. 203–213 (1999)Google Scholar
  3. 3.
    Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing 17(2), 281–308 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Kim, H., Baek, J., Lee, B., Kim, K.: Secret Computation with secrets for mobile agent using one-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (2001)Google Scholar
  5. 5.
    Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  6. 6.
    Lee, B., Kim, H., Kim, K.: Strong proxy signature and its application. In: Proc. of ACISP 2001, vol. 11B-1, pp. 603–608 (2001)Google Scholar
  7. 7.
    Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures: delegation of the power to sign message. IEICE Transaction Functional E79-A(9), 1338–1354 (1996)Google Scholar
  8. 8.
    Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures for delegation signing operation. In: Proceedings of the Third ACM Conference on Computer and Communication Security, New Delhi, India, pp. 48–57 (January 1996)Google Scholar
  9. 9.
    Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996)Google Scholar
  10. 10.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 19–22. Springer, Heidelberg (1985)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Haifeng Qian
    • 1
  • Zhenfu Cao
    • 1
  1. 1.Department of Computer ScienceShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations