Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4277))

Abstract

Delegation of signing capability is a common practice in various applications. Mambo etal. proposed a proxy signatures as a solution for delegation of signing capability. Proxy signatures allow a designated proxy signer to sign on behalf of an original signer. After the concept of proxy signature scheme was proposed, many variants are proposed to support more general delegation setting. To capture all possible delegation structures, the concept of delegation network was introduced by Aura, and an ID-based delegation network was proposed by Chow etal. In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively. In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations. Moreover, we modify our delegation network, and the modified scheme requires only N pairing operations. In general, E is larger than N and E increases according to the complexity of the network. So the modified delegation network is remarkably efficient than the previous delegation network.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Chow, S.S.M., Lui, R.W.C., Hui, L.C.K., Yiu, S.M.: Identity Based Delegation Network. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 99–115. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Aura, T.: On the Structure of Delegation Networks. In: PCSFW 1998, IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  4. Hwang, S.-J., Chen, C.-C.: New Multi-Proxy Multi-Signature Schemes. Applied Mathematics and Computation 147(1), 57–67 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering 15(6) (November/December 2003)

    Google Scholar 

  6. Kuo, W.-C., Chen, M.-Y.: A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. In: Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005) (2005)

    Google Scholar 

  7. Li, X., Chen, K., Zhang, L., Li, S.: Proxy Structured Multisignature Scheme from Bilinear Pairings. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 705–714. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signatures for Delegating Signing Operation. In: Proc. 3rd ACM Conference on Computer and Communications Security (1996)

    Google Scholar 

  9. Park, S.-Y., Lee, S.-H.: Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol. 3597, pp. 340–344. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Sun, H.-M., Lee, N.-Y., Hwang, T.: Threshold proxy signatures. IEE Proc. Computers and Digital Techniques 146(5) (September 1999)

    Google Scholar 

  11. Wang, G., Bao, F., Zhou, J., Deng, R.H.: Comments on A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering 16(10) (October 2004)

    Google Scholar 

  12. Xue, Q., Cao, Z.: A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 715–724. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Xue, Q., Cao, Z.: Improved of Multi-proxy Signature Scheme. In: Proceeding of International Symposium on Communications and Information Technologies, pp. 450–455 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Youn, TY., Park, YH., Kim, C.H., Lim, J. (2006). An Efficient ID-Based Delegation Network. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_62

Download citation

  • DOI: https://doi.org/10.1007/11915034_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics