Skip to main content
Log in

Secure proxy signature schemes from the Weil pairing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A proxy signature scheme is a method which allows an original signer to delegate his signing authority to a designated person, called a proxy signer. Up to now, most of proxy signature schemes are based on the discrete logarithm problem. In this paper, we propose a proxy signature scheme and a threshold proxy signature scheme from the Weil pairing, and also provide a security proof.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Advances in cryptology (EUROCRYPT’98). Lecture notes in computer science, vol 1403. Springer, Berlin, pp 127–144

    Chapter  Google Scholar 

  2. Boneh D, Franklin M (2001) Identity based encryption from Weil pairing. In: Advances in cryptography (CRYPTO 2001), Santa Barbara, CA, August 2001

    Google Scholar 

  3. Boldyreva A, Palacio A, Warinschi B Secure proxy signature schemes for delegation of signing rights. Preprint, available at http://eprint.iacr.org/2003/096/

  4. Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM conference on computer and communications security. Lecture notes in computer science. Springer, Berlin

    Google Scholar 

  5. Herranz J, Saez G Revisiting fully distributed proxy signature schemes. Preprint, available at http://eprint.iacr.org/2003/197/

  6. Kim S, Park S, Won D (1997) Proxy signatures, revisited. In: ICICS’97. Lecture notes in computer science, vol 1334. Springer, Berlin, pp 223–232

    Google Scholar 

  7. Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications. In: Proceedings of SCIS

    Google Scholar 

  8. Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169(1):437–450

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu J, Huang S (2010) Identity-based threshold proxy signature from bilinear pairing. Informatica 21(1):41–56

    MathSciNet  MATH  Google Scholar 

  10. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign message. IEICE Trans Fundam Electron Commun Comput Sci 79-A(9):1338–1353

    Google Scholar 

  11. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegation signing operation. In: Proc third ACM conf on computer and communications security, pp 48–57

    Chapter  Google Scholar 

  12. Neuman BC (1993) Proxy-based authorization and accounting for distributed systems. In: Proc 13th international conference on distributed systems, pp 283–291

    Chapter  Google Scholar 

  13. Umaparasada Rao B, Vasudeva Reddy P (2011) ID-based directed multi-proxy signature scheme from bilinear pairings. Int J Comput Sci Netw Secur 5(1):107–117

    Google Scholar 

  14. Sun X, Li J, Chen G, Yung S (2008) Identity-based directed signature scheme from bilinear pairings. Cryptology e-print archive, report 2008/305. http://eprint.iacr.org

  15. Varadharajan V, Allen P, Black S (1991) An analysis of the proxy problem in distributed systems. In: Proc 1991 IEEE computer society symposium on research in security and privacy, pp 255–275

    Chapter  Google Scholar 

  16. Wu W, Mu Y, Seberry W, Huang X (2007) Identity-based proxy signature from pairings. In: The 4th international conference on autonomic and trusted computing, pp 22–31

    Chapter  Google Scholar 

  17. Xu J, Zhang Z, Feng D (2005) Id-based proxy signature using bilinear pairings. In: Parrallel and distributed processing and applications, pp 359–367

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Her-Tyan Yeh.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, BC., Yeh, HT. Secure proxy signature schemes from the Weil pairing. J Supercomput 65, 496–506 (2013). https://doi.org/10.1007/s11227-012-0760-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-012-0760-3

Keywords

Navigation