Skip to main content

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme

  • Conference paper
Book cover Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted.

This paper is supported by the National Natural Science Foundation of China under Grant No. 60673079.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature for Delegating Signing Operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)

    Google Scholar 

  2. Li, J.G., Cao, Z.F.: Improvement of a Threshold Proxy Signature Scheme. Journal of Computer Research and Development 39(11), 515–518 (2002) (in Chinese)

    MathSciNet  Google Scholar 

  3. Li, J.G., Cao, Z.F., Zhang, Y.C.: Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology (New Series) 9(2), 145–148 (2002)

    Google Scholar 

  4. Li, J.G., Cao, Z.F., Zhang, Y.C.: Nonrepudiable Proxy Multi-signature Scheme. Journal of Computer Science and Technology 18(3), 399–402 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  5. Li, J.G., Cao, Z.F., Zhang, Y.C., Li, J.Z.: Cryptographic Analysis and Modification of Proxy Multi-signature Scheme. High Technology Letters 13(4), 1–5 (2003) (in Chinese)

    MathSciNet  Google Scholar 

  6. Hsu, C.L., Wu, T.S., Wu, T.C.: New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. The Journal of Systems and Software 58, 119–124 (2001)

    Article  Google Scholar 

  7. Hwang, M.S., Lin, I.C., Lu Eric, J.L.: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. International Journal of Informatica 11(2), 1–8 (2000)

    MATH  Google Scholar 

  8. Hwang, S.J., Chen, C.C.: Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(2), 205–212 (2003)

    MathSciNet  MATH  Google Scholar 

  9. Sun, H.M.: An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Computer Communications 22(8), 717–722 (1999)

    Article  Google Scholar 

  10. Sun, H.M., Lee, N.Y., Hwang, T.: Threshold Proxy Signature. IEEE Proceedings-computers & Digital Techniques 146(5), 259–263 (1999)

    Article  Google Scholar 

  11. Zhang, K.: Threshold Proxy Signature Schemes. In: Information Security Workshop, Japan, pp. 191–197 (1997)

    Google Scholar 

  12. Hsu, C.L., Wu, T.S., Wu, T.C.: Improvement of Threshold Proxy Signature Scheme. Applied Mathematics and Computation 136, 315–321 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  13. Tsai, C.S., Tzeng, S.F., Hwang, M.S.: Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(3), 393–402 (2003)

    MathSciNet  MATH  Google Scholar 

  14. Hwang, S.J., Shi, C.H.: A Simple Multi-Proxy Signature Scheme. In: Proceeding of the Tenth National Conference on Information Security, Taiwan (2000)

    Google Scholar 

  15. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their application. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  16. Wang, G.: Designated-verifier proxy signatures for e-commerce. In: Proc. IEEE 2004 Int. Conf. on Multimedia and Expo (ICME 2004), vol. 3, pp. 1731–1734 (2004)

    Google Scholar 

  17. Li, X., Chen, K., Li, S.: Designated-verifier proxy signatures for e-commerce from bilinear pairings. In: Proc. of Int. Conf. on Computer Communication, pp. 1249–1252 (2004)

    Google Scholar 

  18. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  19. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)

    Google Scholar 

  21. Dai, J., Yang, X., Dong, J.: Designated-receiverproxy signature scheme for electronic commerce. In: Proc. of IEEE International Confernece on System, Man and Cybernetics, October 5-8, vol. 1, pp. 384–389 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Li, F., Xue, Q., Zhang, J., Cao, Z. (2009). A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics