Identity-Based Proxy Signature from Pairings

  • Wei Wu
  • Yi Mu
  • Willy Susilo
  • Jennifer Seberry
  • Xinyi Huang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)


A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy signatures have found numerous practical applications such as distributed systems, mobile agent applications, etc. Recently, Xu, Zhang and Feng proposed the first formal models of identity based proxy signature. Unfortunately, their model does not capture the notion of adaptively chosen message and chosen identity attacker in identity based system. In this paper, we redefine the security models of identity based proxy signature to capture the most stringent attacks against adaptively chosen message and chosen identity attacker. We also propose a new provably secure identity basad proxy signature scheme whose security is based on the hardness of Computational Diffie-Hellman problem in the random oracle model.


Original Signer Signature Scheme Proxy Signature Bilinear Pairing Random Oracle Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Boneh, D., Boyen, X.: Short Signatures without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Scheme for Delegation of Signing Rights. In: IACR ePrint Archive (2003), available at
  5. 5.
    Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 399–416. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  6. 6.
    Cheon, J.H.: Security Analysis of the Strong Diffie-Hellman Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1–11. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Methodology, revisited. In: Proceedings of the 30th Annual Symposium on the Theory of Computing-STOC 1998, pp. 209–218 (1998)Google Scholar
  8. 8.
    Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptively Chosen Message Attacks. SIAM Journal on Computing 17(2), 281–308 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers. In: IACR ePrint Archive (2006), available at
  10. 10.
    Huang, X., Mu, Y., Susilo, W., Zhang, F., Chen, X.: A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing – EUC 2005 Workshops. LNCS, vol. 3823, pp. 480–489. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Lee, J.-Y., Cheon, J.H., Kim, S.: An Analysis of Proxy Signatures: Is a Secure Channel Necessary? In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 68–79. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Lee, B., Kim, H., Kim, K.: Strong Proxy Signature and Its Applications. In: Proc of SCIS 2001, pp. 603–608 (2001)Google Scholar
  13. 13.
    Lee, B., Kim, H., Kim, K.: Secure Mobile Agent Using Strong Nondesignated Proxy Signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 474–486. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  14. 14.
    Kim, S., Park, S., Won, D.: Proxy Signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  15. 15.
    Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  16. 16.
    Malkin, T., Obana, S., Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004)Google Scholar
  17. 17.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation Of the Power to Sign Messages. IEICE Trans. Fundamentals E79-A(9), 1338–1353 (1996)Google Scholar
  18. 18.
    Okamoto, T., Inomata, A., Okamoto, E.: A Proposal of Short Proxy Signature Using Pairing. In: International Conference on Information Technology (ITCC 2005), pp. 631–635. IEEE Computer Society Press, Los Alamitos (2005)CrossRefGoogle Scholar
  19. 19.
    Okamoto, T., Tada, M., Okamoto, E.: Extended Proxy Signatures for Smart Cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, pp. 247–258. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  20. 20.
    Paterson, K.G., Schuldt, J.C.N.: Efficient Identity-based Signatures Secure in the Standard Model. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 207–222. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  21. 21.
    Park, H.-U., Lee, I.-Y.A.: Digital Nominative Proxy Signature Scheme for Mobile Communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  22. 22.
    Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  23. 23.
    Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004)Google Scholar
  24. 24.
    Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)Google Scholar
  25. 25.
    Zhang, F., Susilo, W., Mu, Y.: Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 45–56. Springer, Heidelberg (2005)Google Scholar
  26. 26.
    Xu, J., Zhang, Z., Feng, D.: ID-based Proxy Signature Using Bilinear Pairings. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359–367. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Wei Wu
    • 1
  • Yi Mu
    • 1
  • Willy Susilo
    • 1
  • Jennifer Seberry
    • 1
  • Xinyi Huang
    • 1
  1. 1.Centre for Computer and Information Security Research, School of Computer Science & Software Engineering, University of WollongongAustralia

Personalised recommendations