Abstract
A proxy signature scheme is a method which allows an original signer to delegate his signing authority to a designated person, called a proxy signer. Up to now, most of proxy signature schemes are based on the discrete logarithm problem. In this paper, we propose a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing, and also provide a security proof.






Similar content being viewed by others
References
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology (EUROCRYPT’98). Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144
Boneh D, Franklin M (2001) Identity based encryption from Weil pairing. In: Advances in cryptography (CRYPTO 2001), Santa Barbara, CA, August 2001
Boldyreva A, Palacio A, Warinschi B Secure proxy signature schemes for delegation of signing rights. Preprint, available at http://eprint.iacr.org/2003/096/
Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM conference on computer and communications security. Lecture notes in computer science. Springer, Berlin
Herranz J, Saez G Revisiting fully distributed proxy signature schemes. Preprint, available at http://eprint.iacr.org/2003/197/
Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: ICICS’97. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 223–232
Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: Proceedings of SCIS
Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169(1):437–450
Liu J, Huang S (2010) Identity-based threshold proxy signature from bilinear pairing. Informatica 21(1):41–56
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign message. IEICE Trans Fundam Electron Commun Comput Sci 79-A(9):1338–1353
Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegation signing operation. In: Proc third ACM conf on computer and communications security, pp 48–57
Neuman BC (1993) Proxy-based authorization and accounting for distributed systems. In: Proc 13th international conference on distributed systems, pp 283–291
Umaparasada Rao B, Vasudeva Reddy P (2011) ID-based directed multi-proxy signature scheme from bilinear pairings. Int J Comput Sci Netw Secur 5(1):107–117
Sun X, Li J, Chen G, Yung S (2008) Identity-based directed signature scheme from bilinear pairings. Cryptology e-print archive, report 2008/305. http://eprint.iacr.org
Varadharajan V, Allen P, Black S (1991) An analysis of the proxy problem in distributed systems. In: Proc 1991 IEEE computer society symposium on research in security and privacy, pp 255–275
Wu W, Mu Y, Seberry W, Huang X (2007) Identity-based proxy signature from pairings. In: The 4th international conference on autonomic and trusted computing, pp 22–31
Xu J, Zhang Z, Feng D (2005) Id-based proxy signature using bilinear pairings. In: Parrallel and distributed processing and applications, pp 359–367
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, BC., Yeh, HT. Secure proxy signature schemes from the Weil pairing. J Supercomput 65, 496–506 (2013). https://doi.org/10.1007/s11227-012-0760-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-012-0760-3