Abstract
In a multi-proxy signature scheme, an original signer could delegate his signing power to a designated proxy group. Only the cooperation of all proxy signers in the proxy group could generate a legitimate proxy signature on behalf of the original signer. In this paper, we formalize the definition and security model of the identity-based multi-proxy signature, and we construct a new identity-based multi-proxy signature scheme using bilinear pairings. We show the security of our scheme in the random oracle model, and the security of our scheme is based on the hardness of the computational Diffie-Hellman problem.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_17
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptol. 25(1), 57–115 (2012)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)
Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36288-6_2
Gu, K., Jia, W., Deng, Y., Nie, X.: Secure and efficient multi-proxy signature scheme in the standard model. Chin. J. Electron. 25(1), 93–99 (2016)
Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473–484. Springer, Heidelberg (2006). https://doi.org/10.1007/11943952_40
Hwang, S., Shi, C.: A simple multi-proxy signature scheme. In: Proceedings of the 10th National Conference on Information Security, Hualien, Taiwan, ROC, pp. 134–138 (2000)
Li, J., Xu, L., Zhang, Y.: Provably secure certificate-based proxy signature schemes. J. Comput. 4(6), 444–452 (2009)
Li, S., Zhang, F.: A new multi-proxy signature from bilinear pairing. Chin. J. Electron. 24(1), 90–94 (2007)
Li, X., Chen, K.: ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)
Libert, B., Quisquater, J.J.: The exact security of an identity based signature and its applications. Cryptology ePrint Archive, Report 2004/102 (2004). http://eprint.iacr.org/2004/102
Liu, Z., Hu, Y., Zhang, X., Ma, H.: Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3), 494–501 (2011)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals E79-A(9), 1338–1353 (1996)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signature for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM, New York (1996)
Mishra, S., Sahu, R.A., Padhye, S., Yadav, R.S.: Efficient ID-based multi-proxy signature scheme from bilinear pairing based on k-plus problem. In: Hruschka, E.R., Watada, J., do Carmo Nicoletti, M. (eds.) INTECH 2011. CCIS, vol. 165, pp. 113–122. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22247-4_10
Rao, B.U., Reddy, P.V.: ID-based directed multi-proxy signature scheme from bilinear pairings. Int. J. Comput. Sci. Secur. 5(1), 717–727 (2011)
Seo, S., Choi, K., Hwang, J., Kim, S.: Efficient certificateless proxy signature scheme with provable security. Inf. Sci. 188, 322–337 (2012)
Singh, H., Verma, G.: ID-based proxy signature scheme with message recovery. J. Syst. Softw. 85(1), 209–214 (2012)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_7
Xiong, H., Hu, J., Chen, Z., Li, F.: On the security of an identity based multi-proxy signature scheme. Comput. Electr. Eng. 37(1), 129–135 (2011)
Zhang, F., Kim, K.: Efficient ID-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-45067-X_27
Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E., Davida, G., Mambo, M. (eds.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0030429
Acknowledgements
The authors would like to thank the anonymous reviewers for their helpful comments. This work is supported in part by the National Natural Science Foundation of China under Grant No. 61772150 and No. 61862012; the Natural Science Foundation of Fujian Province of China under Grant No. 2019J01750 and No. 2015J01662; the Research Project of Fujian Provincial Education Department of China under Grant No. JAT170345, No. JAT170346, and No. JK2017031; the Guangxi Key R&D Program under Grant No. AB17195025, the Guangxi Natural Science Foundation under Grant No. 2018GXNSFDA281054 and No. 2018GXNSFAA281232, the National Cryptography Development Fund of China under Grant No. MMJJ20170217, and the Project of Key Laboratory of Financial Mathematics of Fujian Province University (Putian University) under Grant No. JR201806.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Q., Huang, Z., Ding, Y., Zhou, Y., Huang, H. (2019). A New Provably Secure Identity-Based Multi-proxy Signature Scheme. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)