Abstract
A (t,n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, an identity-based (t,n) threshold proxy signcryption scheme using bilinear pairings is proposed. Our construction is based on Baek and Zheng’s pairing-based verifiable secret sharing scheme and Libert and Quisquater’s identity-based signcryption scheme. As compared to the previous threshold proxy signcryption schemes, the key management problem in our scheme is simplified because of using identity-based cryptography. We also present an application of our scheme in multi-agent systems.
This work is supported by the National Natural Science Foundation of China under contract no. 60473029.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1984)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1986)
Guillou, L., Quisquater, J.J.: A “Paradoxical” Identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1988)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) Advances in Cryptology-CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E79-A, 1338–1353 (1996)
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, Springer, Heidelberg (1997)
Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E., Davida, G.I., Mambo, M. (eds.) Information Security Workshop-ISW’97. LNCS, vol. 1396, pp. 191–197. Springer, Heidelberg (1998)
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Gamage, C., Leiwo, J., Zheng, Y.: An efficient scheme for secure message transmission using proxy-signcryption. In: 22nd Australasian Computer Science Conference, Auckland, New Zealand, pp. 420–431 (1999)
Chan, W.K., Wei, V.K.: A threshold proxy signcryption. In: 2002 International Conference on Security and Management, Las Vegas, USA (2002)
Li, J., Li, J., Cao, Z., Zhang, Y.: A nonrepudiable threshold proxy signcryption scheme with known proxy agent. Journal of Software 14, 2021–2027 (2003)
Lee, B., Kim, H., Kim, K.: Secure mobile agent using strong non-designated proxy signature. In: Varadharajan, V., Mu, Y. (eds.) Information Security and Privacy. LNCS, vol. 2119, pp. 474–484. Springer, Heidelberg (2001)
Baek, J., Zheng, Y.: Identity-based threshold signature from the bilinear pairings. In: International Conference on Information Technology: Coding and Computing-ITCC 2004, Las Vegas, USA, pp. 124–128 (2004)
Libert, B., Quisquater, J.J.: A new identity based signcryption schemes from pairings. In: IEEE Information Theory Workshop, Paris, France, pp. 155–158 (2003)
Lin, C.Y., Wu, T.C., Zhang, F., Hwang, J.J.: New identity-based society oriented signature schemes from pairings on elliptic curves. Applied Mathematics and Computation 160, 245–260 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, F., Hu, Y., Liu, S. (2007). ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_43
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)