Skip to main content
Log in

Secure proxy signature schemes from the Weil pairing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A proxy signature scheme is a method which allows an original signer to delegate his signing authority to a designated person, called a proxy signer. Up to now, most of proxy signature schemes are based on the discrete logarithm problem. In this paper, we propose a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing, and also provide a security proof.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology (EUROCRYPT’98). Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144

    Chapter  Google Scholar 

  2. Boneh D, Franklin M (2001) Identity based encryption from Weil pairing. In: Advances in cryptography (CRYPTO 2001), Santa Barbara, CA, August 2001

    Google Scholar 

  3. Boldyreva A, Palacio A, Warinschi B Secure proxy signature schemes for delegation of signing rights. Preprint, available at http://eprint.iacr.org/2003/096/

  4. Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM conference on computer and communications security. Lecture notes in computer science. Springer, Berlin

    Google Scholar 

  5. Herranz J, Saez G Revisiting fully distributed proxy signature schemes. Preprint, available at http://eprint.iacr.org/2003/197/

  6. Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: ICICS’97. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 223–232

    Google Scholar 

  7. Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: Proceedings of SCIS

    Google Scholar 

  8. Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169(1):437–450

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu J, Huang S (2010) Identity-based threshold proxy signature from bilinear pairing. Informatica 21(1):41–56

    MathSciNet  MATH  Google Scholar 

  10. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign message. IEICE Trans Fundam Electron Commun Comput Sci 79-A(9):1338–1353

    Google Scholar 

  11. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegation signing operation. In: Proc third ACM conf on computer and communications security, pp 48–57

    Chapter  Google Scholar 

  12. Neuman BC (1993) Proxy-based authorization and accounting for distributed systems. In: Proc 13th international conference on distributed systems, pp 283–291

    Chapter  Google Scholar 

  13. Umaparasada Rao B, Vasudeva Reddy P (2011) ID-based directed multi-proxy signature scheme from bilinear pairings. Int J Comput Sci Netw Secur 5(1):107–117

    Google Scholar 

  14. Sun X, Li J, Chen G, Yung S (2008) Identity-based directed signature scheme from bilinear pairings. Cryptology e-print archive, report 2008/305. http://eprint.iacr.org

  15. Varadharajan V, Allen P, Black S (1991) An analysis of the proxy problem in distributed systems. In: Proc 1991 IEEE computer society symposium on research in security and privacy, pp 255–275

    Chapter  Google Scholar 

  16. Wu W, Mu Y, Seberry W, Huang X (2007) Identity-based proxy signature from pairings. In: The 4th international conference on autonomic and trusted computing, pp 22–31

    Chapter  Google Scholar 

  17. Xu J, Zhang Z, Feng D (2005) Id-based proxy signature using bilinear pairings. In: Parrallel and distributed processing and applications, pp 359–367

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Her-Tyan Yeh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, BC., Yeh, HT. Secure proxy signature schemes from the Weil pairing. J Supercomput 65, 496–506 (2013). https://doi.org/10.1007/s11227-012-0760-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-012-0760-3

Keywords