ID-Based Proxy Signature Using Bilinear Pairings

  • Jing Xu
  • Zhenfeng Zhang
  • Dengguo Feng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)


Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes and propose a scheme based on the bilinear pairings. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model.


ID-based signatures proxy signatures bilinear pairings provable security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), pp. 48–57. ACM, New York (1996)CrossRefGoogle Scholar
  2. 2.
    Herranz, J., Sez, G.: Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures. In: Proceedings of Financial Cryptography 2003. LNCS. Springer, Heidelberg (2003)Google Scholar
  3. 3.
    Lal, S., Awasthi, A.K.: Proxy blind signature scheme. Cryptology ePrint Archive, Report 2003/072 (2003), Available at,
  4. 4.
    Lal, S., Awasthi, A.K.: A scheme for obtaining a warrant message from the digital proxy signatures. Cryptology ePrint Archive, Report 2003/073 (2003), Available at,
  5. 5.
    Park, H.-U., Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Cryptography and Information Security 2001 (2001)Google Scholar
  7. 7.
    Shum, K., Wei, V.-K.: A strong proxy signature scheme with proxy signer privacy protection. In: Eleventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (2002)Google Scholar
  8. 8.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights, IACR ePrint Archive (2003), available at,
  9. 9.
    Malkin, T.G., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  11. 11.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Joux, A.: The weil and tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20–32. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Xu, J., Zhang, Z.F., Feng, D.G.: ID-Based Proxy Signature Using Bilinear Pairings, Available from,
  17. 17.
    Libert, B., Quisquater, J.J.: The Exact Security of an Identity Based Signature and Its Applications, Available from,

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jing Xu
    • 1
  • Zhenfeng Zhang
    • 2
  • Dengguo Feng
    • 3
  1. 1.State Key Laboratory of Information SecurityP.R. China
  2. 2.Graduate School of Chinese Academy of SciencesBeijingP.R. China
  3. 3.Institute of SoftwareChinese Academy of SciencesBeijingP.R. China

Personalised recommendations