Advertisement

ID-Based Proxy Signature Using Bilinear Pairings

  • Jing Xu
  • Zhenfeng Zhang
  • Dengguo Feng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)

Abstract

Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. A proxy signature scheme permits an entity to delegate its signing rights to another entity. But to date, no ID-based proxy signature scheme with provable security has been proposed. In this paper, we formalize a notion of security for ID-based proxy signature schemes and propose a scheme based on the bilinear pairings. We show that the security of our scheme is tightly related to the computational Diffie-Hellman assumption in the random oracle model.

Keywords

ID-based signatures proxy signatures bilinear pairings provable security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), pp. 48–57. ACM, New York (1996)CrossRefGoogle Scholar
  2. 2.
    Herranz, J., Sez, G.: Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures. In: Proceedings of Financial Cryptography 2003. LNCS. Springer, Heidelberg (2003)Google Scholar
  3. 3.
    Lal, S., Awasthi, A.K.: Proxy blind signature scheme. Cryptology ePrint Archive, Report 2003/072 (2003), Available at, http://eprint.iacr.org/
  4. 4.
    Lal, S., Awasthi, A.K.: A scheme for obtaining a warrant message from the digital proxy signatures. Cryptology ePrint Archive, Report 2003/073 (2003), Available at, http://eprint.iacr.org/
  5. 5.
    Park, H.-U., Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Cryptography and Information Security 2001 (2001)Google Scholar
  7. 7.
    Shum, K., Wei, V.-K.: A strong proxy signature scheme with proxy signer privacy protection. In: Eleventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (2002)Google Scholar
  8. 8.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights, IACR ePrint Archive (2003), available at, http://eprint.iacr.org/2003/096/
  9. 9.
    Malkin, T.G., Obana, S., Yung, M.: The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  11. 11.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Joux, A.: The weil and tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20–32. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Xu, J., Zhang, Z.F., Feng, D.G.: ID-Based Proxy Signature Using Bilinear Pairings, Available from, http://eprint.iacr.org/2004/206
  17. 17.
    Libert, B., Quisquater, J.J.: The Exact Security of an Identity Based Signature and Its Applications, Available from, http://eprint.iacr.org/2004/102

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jing Xu
    • 1
  • Zhenfeng Zhang
    • 2
  • Dengguo Feng
    • 3
  1. 1.State Key Laboratory of Information SecurityP.R. China
  2. 2.Graduate School of Chinese Academy of SciencesBeijingP.R. China
  3. 3.Institute of SoftwareChinese Academy of SciencesBeijingP.R. China

Personalised recommendations