Abstract
Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is proposed, so that anyone can be convinced of who obtained delegation from whom in order to produce the final proxy signature. In this paper, we consider the delegation network for identity-based (ID-based) scenario. Since the public key is just a string denoting the user’s identity, certificate management is simplified. Proxy signature schemes have been devised to delegate signing authorities. We show that a trivial attempt of extending an existing ID-based proxy signature may result in an insecure scheme. After that we propose a building block of our ID-based delegation network, which is an ID-based proxy signature supporting batch verifications. Our proposed ID-based delegation network is flexible in the sense that the whole delegation network does not need to be known in advance. Our proposal is provably secure under the random oracle model.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aura, T.: On the Structure of Delegation Networks. In: PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1998)
Bakker, A., van Steen, M., Tanenbaum, A.S.: A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. In: Proceedings of IEEE International Symposium on Network Computing and Applications (NCA 2001), Cambridge, MA, October 8-10 (2001)
Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
Chen, X., Zhang, F., Kim, K.: ID-based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. In: KIISC conference (2003)
Chow, S.S.M.: Verifiable Pairing and Its Applications. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 170–187. Springer, Heidelberg (2005)
Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)
Ellison, C.M., Franz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, Simple Public Key Certificate, SPKI Examples. Internet draft, SPKI Working Group, Internet Engineering Task Force (September 1999)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proceedings of the Fifth ACM conference on Computer and Communications Security, pp. 83–92. ACM Press, New York (1998)
Ghodosi, H., Pieprzyk, J.: Repudiation of Cheating and Non-Repudiation of Zhang’s Proxy Signature Schemes. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol. 1587, p. 129. Springer, Heidelberg (1999)
Herranz, J., Sáez, G.: Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 286–302. Springer, Heidelberg (2003)
Herranz, J., Sáez, G.: Revisiting Fully Distributed Proxy Signature Schemes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 356–370. Springer, Heidelberg (2004)
Hess, F.: Efficient Identity Based Signature Schemes based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
Hwang, S.-J., Chen, C.-C.: New Multi-Proxy Multi-Signature Schemes. Applied Mathematics and Computation 147(1), 57–67 (2004)
Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997)
Lee, B., Kim, H., Kim, K.: Secure Mobile Agent Using Strong Non-Designated Proxy Signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, p. 1. Springer, Heidelberg (2001)
Lee, N.-Y., Hwang, T., Wang, C.-H.: On Zhang’s Nonrepudiable Proxy Signature Schemes. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 415. Springer, Heidelberg (1998)
Leiwo, J., Hanle, C., Homburg, P., Tanenbaum, A.S.: Disallowing Unauthorized State Changes of Distributed Shared Objects. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. Kluwer Academic Publishers, Dordrecht (2000)
Libert, B., Quisquater, J.-J.: The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102 (2004), Available at http://eprint.iacr.org
Lin, C.-Y., Wu, T.-C., Zhang, F.: A Structured Multisignature Scheme from the Gap Diffie-Hellman Group. Cryptology ePrint Archive, Report 2003/090 (2003), Available at http://eprint.iacr.org
Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans. Fundamentals E79-A(9) (September 1996)
Clifford Neuman, B.: Proxy-Based Authorization and Accounting for Distributed Systems. In: Thirteenth International Conference on Distributed Computing Systems, pp. 283–291 (1993)
Okamoto, T., Tada, M., Okamoto, E.: Extended Proxy Signatures for Smart Cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, p. 247. Springer, Heidelberg (1999)
Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology: The Journal of the International Association for Cryptologic Research 13(3), 361–396 (2000)
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on Pairing over Elliptic Curve. In: Proceedings of Symposium on Cryptography and Information Security (SCIS 2000) C-20 (2000)
Seo, S.-H., Lee, S.-H.: New Nominative Proxy Signature Scheme for Mobile Communication. In: Conference on Security and Protection of Information 2003, Brno, Czech Republic, April 28-30, pp. 149–154 (2003)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Solinas, J.A.: ID-based Digital Signature Algorithms. Slide Show presented at 7th Workshop on Elliptic Curve Cryptography (ECC 2003) (August 2003)
Sun, H.-M., Hsieh, B.-T., Lin, C.T.: Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme. In: Twelfth National Information Security Conference (ISC 2002) (2002)
Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004); Also available at Cryptology ePrint Archive, Report 2003/196
Xu, J., Zhang, Z., Feng, D.: ID-Based Proxy Signature Using Bilinear Pairings. Cryptology ePrint Archive, Report 2004/206 (2004), Available at http://eprint.iacr.org
Yoon, H., Cheon, J.H., Kim, Y.: Batch Verifications with ID-Based Signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 233–248. Springer, Heidelberg (2005)
Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Zhang, K.: Nonrepudiable Proxy Signature Schemes, Available at http://citeseer.nj.nec.com/zhang97nonrepudiable.html
Zhang, K.: Threshold Proxy Signature Schemes. In: Proceedings of the First International Information Security Workshop, pp. 282–290 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chow, S.S.M., Lui, R.W.C., Hui, L.C.K., Yiu, S.M. (2005). Identity Based Delegation Network. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology – Mycrypt 2005. Mycrypt 2005. Lecture Notes in Computer Science, vol 3715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554868_8
Download citation
DOI: https://doi.org/10.1007/11554868_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28938-8
Online ISBN: 978-3-540-32066-1
eBook Packages: Computer ScienceComputer Science (R0)