Abstract
Delegation of signing capability is a common practice in various applications. Mambo etal. proposed a proxy signatures as a solution for delegation of signing capability. Proxy signatures allow a designated proxy signer to sign on behalf of an original signer. After the concept of proxy signature scheme was proposed, many variants are proposed to support more general delegation setting. To capture all possible delegation structures, the concept of delegation network was introduced by Aura, and an ID-based delegation network was proposed by Chow etal. In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively. In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations. Moreover, we modify our delegation network, and the modified scheme requires only N pairing operations. In general, E is larger than N and E increases according to the complexity of the network. So the modified delegation network is remarkably efficient than the previous delegation network.
An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)
Chow, S.S.M., Lui, R.W.C., Hui, L.C.K., Yiu, S.M.: Identity Based Delegation Network. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 99–115. Springer, Heidelberg (2005)
Aura, T.: On the Structure of Delegation Networks. In: PCSFW 1998, IEEE Computer Society Press, Los Alamitos (1998)
Hwang, S.-J., Chen, C.-C.: New Multi-Proxy Multi-Signature Schemes. Applied Mathematics and Computation 147(1), 57–67 (2004)
Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering 15(6) (November/December 2003)
Kuo, W.-C., Chen, M.-Y.: A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. In: Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005) (2005)
Li, X., Chen, K., Zhang, L., Li, S.: Proxy Structured Multisignature Scheme from Bilinear Pairings. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 705–714. Springer, Heidelberg (2004)
Mambo, M., Usuda, K., Okamoto, E.: Proxy Signatures for Delegating Signing Operation. In: Proc. 3rd ACM Conference on Computer and Communications Security (1996)
Park, S.-Y., Lee, S.-H.: Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol. 3597, pp. 340–344. Springer, Heidelberg (2005)
Sun, H.-M., Lee, N.-Y., Hwang, T.: Threshold proxy signatures. IEE Proc. Computers and Digital Techniques 146(5) (September 1999)
Wang, G., Bao, F., Zhou, J., Deng, R.H.: Comments on A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering 16(10) (October 2004)
Xue, Q., Cao, Z.: A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 715–724. Springer, Heidelberg (2004)
Xue, Q., Cao, Z.: Improved of Multi-proxy Signature Scheme. In: Proceeding of International Symposium on Communications and Information Technologies, pp. 450–455 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Youn, TY., Park, YH., Kim, C.H., Lim, J. (2006). An Efficient ID-Based Delegation Network. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_62
Download citation
DOI: https://doi.org/10.1007/11915034_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48269-7
Online ISBN: 978-3-540-48272-7
eBook Packages: Computer ScienceComputer Science (R0)