Abstract
In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted.
This paper is supported by the National Natural Science Foundation of China under Grant No. 60673079.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature for Delegating Signing Operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)
Li, J.G., Cao, Z.F.: Improvement of a Threshold Proxy Signature Scheme. Journal of Computer Research and Development 39(11), 515–518 (2002) (in Chinese)
Li, J.G., Cao, Z.F., Zhang, Y.C.: Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology (New Series) 9(2), 145–148 (2002)
Li, J.G., Cao, Z.F., Zhang, Y.C.: Nonrepudiable Proxy Multi-signature Scheme. Journal of Computer Science and Technology 18(3), 399–402 (2003)
Li, J.G., Cao, Z.F., Zhang, Y.C., Li, J.Z.: Cryptographic Analysis and Modification of Proxy Multi-signature Scheme. High Technology Letters 13(4), 1–5 (2003) (in Chinese)
Hsu, C.L., Wu, T.S., Wu, T.C.: New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. The Journal of Systems and Software 58, 119–124 (2001)
Hwang, M.S., Lin, I.C., Lu Eric, J.L.: A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. International Journal of Informatica 11(2), 1–8 (2000)
Hwang, S.J., Chen, C.C.: Cryptanalysis of Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(2), 205–212 (2003)
Sun, H.M.: An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Computer Communications 22(8), 717–722 (1999)
Sun, H.M., Lee, N.Y., Hwang, T.: Threshold Proxy Signature. IEEE Proceedings-computers & Digital Techniques 146(5), 259–263 (1999)
Zhang, K.: Threshold Proxy Signature Schemes. In: Information Security Workshop, Japan, pp. 191–197 (1997)
Hsu, C.L., Wu, T.S., Wu, T.C.: Improvement of Threshold Proxy Signature Scheme. Applied Mathematics and Computation 136, 315–321 (2003)
Tsai, C.S., Tzeng, S.F., Hwang, M.S.: Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 14(3), 393–402 (2003)
Hwang, S.J., Shi, C.H.: A Simple Multi-Proxy Signature Scheme. In: Proceeding of the Tenth National Conference on Information Security, Taiwan (2000)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their application. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Wang, G.: Designated-verifier proxy signatures for e-commerce. In: Proc. IEEE 2004 Int. Conf. on Multimedia and Expo (ICME 2004), vol. 3, pp. 1731–1734 (2004)
Li, X., Chen, K., Li, S.: Designated-verifier proxy signatures for e-commerce from bilinear pairings. In: Proc. of Int. Conf. on Computer Communication, pp. 1249–1252 (2004)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)
Dai, J., Yang, X., Dong, J.: Designated-receiverproxy signature scheme for electronic commerce. In: Proc. of IEEE International Confernece on System, Man and Cybernetics, October 5-8, vol. 1, pp. 384–389 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, F., Xue, Q., Zhang, J., Cao, Z. (2009). A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-03354-4_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03353-7
Online ISBN: 978-3-642-03354-4
eBook Packages: Computer ScienceComputer Science (R0)