Skip to main content

A New Provably Secure Identity-Based Multi-proxy Signature Scheme

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Abstract

In a multi-proxy signature scheme, an original signer could delegate his signing power to a designated proxy group. Only the cooperation of all proxy signers in the proxy group could generate a legitimate proxy signature on behalf of the original signer. In this paper, we formalize the definition and security model of the identity-based multi-proxy signature, and we construct a new identity-based multi-proxy signature scheme using bilinear pairings. We show the security of our scheme in the random oracle model, and the security of our scheme is based on the hardness of the computational Diffie-Hellman problem.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_17

    Chapter  Google Scholar 

  2. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57–115 (2012)

    Article  MathSciNet  Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  4. Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)

    Article  MathSciNet  Google Scholar 

  5. Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36288-6_2

    Chapter  Google Scholar 

  6. Gu, K., Jia, W., Deng, Y., Nie, X.: Secure and efficient multi-proxy signature scheme in the standard model. Chin. J. Electron. 25(1), 93–99 (2016)

    Article  Google Scholar 

  7. Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473–484. Springer, Heidelberg (2006). https://doi.org/10.1007/11943952_40

    Chapter  Google Scholar 

  8. Hwang, S., Shi, C.: A simple multi-proxy signature scheme. In: Proceedings of the 10th National Conference on Information Security, Hualien, Taiwan, ROC, pp. 134–138 (2000)

    Google Scholar 

  9. Li, J., Xu, L., Zhang, Y.: Provably secure certificate-based proxy signature schemes. J. Comput. 4(6), 444–452 (2009)

    Article  Google Scholar 

  10. Li, S., Zhang, F.: A new multi-proxy signature from bilinear pairing. Chin. J. Electron. 24(1), 90–94 (2007)

    Google Scholar 

  11. Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)

    MathSciNet  MATH  Google Scholar 

  12. Libert, B., Quisquater, J.J.: The exact security of an identity based signature and its applications. Cryptology ePrint Archive, Report 2004/102 (2004). http://eprint.iacr.org/2004/102

  13. Liu, Z., Hu, Y., Zhang, X., Ma, H.: Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3), 494–501 (2011)

    Article  Google Scholar 

  14. Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals E79-A(9), 1338–1353 (1996)

    Google Scholar 

  15. Mambo, M., Usuda, K., Okamoto, E.: Proxy signature for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM, New York (1996)

    Google Scholar 

  16. Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: Efficient ID-based multi-proxy signature scheme from bilinear pairing based on k-plus problem. In: Hruschka, E.R., Watada, J., do Carmo Nicoletti, M. (eds.) INTECH 2011. CCIS, vol. 165, pp. 113–122. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22247-4_10

    Chapter  Google Scholar 

  17. Rao, B.U., Reddy, P.V.: ID-based directed multi-proxy signature scheme from bilinear pairings. Int. J. Comput. Sci. Secur. 5(1), 717–727 (2011)

    Google Scholar 

  18. Seo, S., Choi, K., Hwang, J., Kim, S.: Efficient certificateless proxy signature scheme with provable security. Inf. Sci. 188, 322–337 (2012)

    Article  MathSciNet  Google Scholar 

  19. Singh, H., Verma, G.: ID-based proxy signature scheme with message recovery. J. Syst. Softw. 85(1), 209–214 (2012)

    Article  Google Scholar 

  20. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  21. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7

    Chapter  Google Scholar 

  22. Xiong, H., Hu, J., Chen, Z., Li, F.: On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(1), 129–135 (2011)

    Article  Google Scholar 

  23. Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45067-X_27

    Chapter  Google Scholar 

  24. Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0030429

    Chapter  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their helpful comments. This work is supported in part by the National Natural Science Foundation of China under Grant No. 61772150 and No. 61862012; the Natural Science Foundation of Fujian Province of China under Grant No. 2019J01750 and No. 2015J01662; the Research Project of Fujian Provincial Education Department of China under Grant No. JAT170345, No. JAT170346, and No. JK2017031; the Guangxi Key R&D Program under Grant No. AB17195025, the Guangxi Natural Science Foundation under Grant No. 2018GXNSFDA281054 and No. 2018GXNSFAA281232, the National Cryptography Development Fund of China under Grant No. MMJJ20170217, and the Project of Key Laboratory of Financial Mathematics of Fujian Province University (Putian University) under Grant No. JR201806.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qunshan Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Q., Huang, Z., Ding, Y., Zhou, Y., Huang, H. (2019). A New Provably Secure Identity-Based Multi-proxy Signature Scheme. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics