ID-based multi-proxy multi-signature scheme from bilinear pairing (original) (raw)
Related papers
An ID-based multi-proxy multi-signature scheme
Computer and Communication Technology ( …
The identity (ID) based public key cryptosystem simplifies the key management and provides moderate security with comparison to the certificate based public key cryptosystem. Many signature schemes have been proposed using the identity of user. Proxy signature scheme enables the original signer to delegate his/her signing capability to a proxy signer. Bilinear pairings are useful in signature protocols for the ease of computation. In this paper, we have proposed an ID-based multi-proxy multi-signature scheme from bilinear pairing, using the schemes of Cao and Cao [2, 3] and Li and Chen [7]. We have also discussed the security properties of our scheme.
A New Identity-based Proxy Signature Scheme from Bilinear Pairings
2006 2nd International Conference on Information & Communication Technologies, 2006
Proxy signature schemes allow a proxy signer to generate a proxy signature on behalf of an original signer. In this paper we propose an Identity-based proxy signature scheme from bilinear pairings. In comparison with the Xu et al's scheme, our scheme is more efficient in computation and requires fewer pairing operations especially in verification phase.
Efficient Multi-proxy Signature Scheme from Bilinear Pairing
2012
Abstract Digital signatures are efficient tools for source authenticationin cryptography. The concept of proxy signature enables a signer todelegate its signing capability to any other party, called proxy signer. Inthis paper, an efficient multi-proxy signature scheme is proposed frombilinear pairing, using the Boneh, Lynn and Shacham's (BLS) shortsignature 1 and ID-based signature of Xun Yi 2. The size of signature inour scheme is less than those of other existing schemes 3-4.
Efficient ID-Based Multi-proxy Signature Scheme from Bilinear Pairing Based on k-plus Problem
Integrated Computing …, 2011
Proxy signatures are efficient alternatives to delegate the signing rights. In a proxy signature scheme, the original signer can delegate its signing rights to any other party, to make signature on its behalf. In a multi-proxy signature scheme, the original signer delegates its signing rights to a group of persons called proxy groups. With the exploit of bilinear pairing over elliptic curves, several ID-based multi-proxy signature schemes have been developed till now . In this paper, we have proposed an ID-based multi-proxy signature, based on 'k-plus problem'. The proposed scheme is secure under the INV-CDHP assumption. Moreover, our scheme is computationally more efficient than the schemes and assure all the security requirements of a proxy signature, given in .
An Efficient Multi-proxy System for Proxy Signature Scheme
In the last few years, the traditonal certificate-based setting is replaced by the ID-based setting. Proxy signatures allow the delegation of signing rights from an original user to its proxy agent. Normally, the original signer can authorize a group of proxy agents to sign any document on its behalf. Currently in our study, we have proposed an ID-based multi-proxy signature scheme, from bilinear pairings based on 'k-plus problem'. We document that the proposed scheme is secure under the inverse computational Die-Hellman (INV-CDH) assumption. Besides, we have proven that the new scheme is computationally more efficient and takes less running time than other existing schemes [5, 10]. Our proposed method meets all the security requirements of a proxy signature scheme proposed by Lee.
On the security of an identity based multi-proxy signature scheme
Computers & Electrical Engineering, 2011
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and security model of an identity-based multi-proxy signature scheme, then proposed an identity-based multi-proxy signature scheme from bilinear pairings and proved its security in their security model. Although they proved that their scheme is secure under this model, we disprove their claim and show that their scheme is not secure. We also present a simple fix to prevent this attack.
Secure and efficient identity-based proxy signature scheme with message recovery
2020
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages on behalf of the original signer. In today’s modern society, many applications use this mechanism. Several types of delegations are quite prevalent and the delegation of signing authority is one of them. In a traditional digital signature scheme, signer transmits signature along with message for verification, which leads to additional communication, computation cost and requires extra bandwidth. To resolve these issues, in this paper, we present an efficient ID-based proxy signature scheme with message recovery using bilinear pairings. Because of the message recovery feature, the proxy signer need not send the message to the verifier, so that the proposed scheme reduces the bandwidth requirement and communication cost. Our proposed scheme is proven secure against existential fo...
An Improved ID-based Proxy Signature Scheme Based on Elliptic Curve Cryptography
2016
Proxy signature schemes allow the original signer of a message to delegate his signing capability to a proxy signer to generate a valid proxy signature on behalf of the original signer. One such scheme is proposed by Zhang and Kim which is based on Elliptic Curve Cryptography and Identity based Signature. However, Zhang’s scheme requires secure channel for transmission of private key, has no provision of private key revocation and signature verification by any user. In this paper, we propose an improved ID based proxy signature scheme based on bilinear pairing. The scheme employs Knapsack algorithm for key distribution which eliminates the need for secure channel for sending the private keys from Private key generator (PKG) to respective users. The scheme also supports private key revocation by concatenating time parameter with public key of proxy signers. The signature can be verified only by a designated verifier. It is shown that the proposed proxy signature scheme satisfies all ...
Improved Proxy Signature Scheme without Bilinear Pairings
Proxy signature is an active research area in cryptography. In order to save the running time and the size of the signature, recently a provable secure proxy signature scheme without bilinear pairings has been proposed which is based on elliptic curve discrete log problem (ECDLP). In this paper, we point out some forgery attacks and security issues on this scheme. Furthermore, we also improve the scheme to make it secure against these forgeries. Our scheme is as efficient as previous proposed scheme.
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings
2007
Multi-proxy signature allows an original signer authorizing a proxy group as his proxy agent and only the cooperation of all proxy signers in the group can create a proxy signature on behalf of the original signer. Recently, Jin and Wen defined a formal model of certificateless multi-proxy signature and proposed a concrete scheme. They claimed that their scheme is provably secure in their security model. Unfortunately, by giving concrete attacks, we show that Jin-Wen's certificateless multi-proxy signature scheme is not secure according to their security model. Possible improvements of their scheme are also suggested to prevent these attacks.