Abstract
Proxy signature schemes enable an entity to delegate its signing rights to any other party, called proxy signer. As a variant of proxy signature primitive, proxymultisignature allows a group of original signers to delegate their signing capabilities to a single proxy signer in such a way that the proxy signer can sign a message on behalf of the group of original signers. We propose a concrete ID-based proxy multi-signature scheme from bilinear pairings. The proposed scheme is existential unforgeable against adaptively chosen message and given ID-attack in random oracle model under the computational Diffie-Hellman (CDH) assumption. The fascinating property of new scheme is that the size of a proxy multi-signature is independent of the number of original signers. Furthermore the proposed scheme is simple and computationally more efficient than other ID-based proxy multisignature schemes.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystem and signature scheme. In: Proceedings of Crypto’84 on Advances in cryptology. 1984, 47–53
Hesss F, Efficient identity based signature schemes based on pairings. In: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. 2003, 310–324
Paterson K G. ID-based signatures from pairings on elliptic curves. IEEE Electronic Letters, 2002, 38(18): 1025–1026
Tanaka H. A realization scheme for the identity-based cryptosystem. In: Proceedings of CRYPTO’ 87 Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. 1987, 340–349
Tsuji S, Itoh T. An ID-based cryptosystem based on the discrete logarithm problem. IEEE Journal of Selected Areas in Communications, 1989, 7(4): 467–473
Boneh D, Franklin M K. Identity-based encryption from the Weil pairing. In: Proceedings of 21st Annual International Cryptology Conference. 2001, 213–229
Cha J C, Cheon J H. An identity-based signature from gap Diffie-Hellman groups. In: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography. 2003, 18–30
Smart N P. An identity based authenticated key agreement protocol based on theWeil pairing. IEEE Electronic Letters, 2002, 38(13): 630–632
Yi X. An identity-based signature scheme from the Weil pairing. IEEE Communications Letters, 2003, 7(2): 76–78
Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 1996, E79-A(9): 1338–1354
Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. IEEE Electronics Letters, 2000, 36(6): 527–528
Li X, Chen K, Li S. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Proceedings of the 5th International Conference on Parallel and Distributed Computing: Applications and Technologies. 2004, 591–595
Li X, Chen K. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation, 2005, 169(1): 437–450
Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceedings of 2001 Symposium on Cryptography and Information Security. 2001, 603–608
Gu C X, Pan H, Zhu Y F. A new ID-based proxy multi-signature scheme from bilinear pairings. Wuhan University Journal of Natural Sciences, 2006, 11(1): 193–197
Wang Q, Cao Z. Identity based proxy multi-signature. Journal of Systems and Software, 2007, 80(7): 1023–1029
Gentry C, Ramzan Z. Identity-based aggregate signatures. In: Proceedings of 9th International Conference on Theory and Practice of Public-Key Cryptography. 2006, 257–273
Shao Z. Improvement of identity-based proxy multi-signature scheme. Journal of Systems and Software, 2009, 82(5): 794–800
Cao F, Cao Z. A secure identity-based proxy multi-signature scheme. Information Sciences, 2009, 179(3): 292–302
Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights. 2003, http://eprint.iacr.org/2003/096
Wang, Q, Cao Z. Security arguments for partial delegation with warrant proxy signature schemes. 2004, http://eprint.iacr.org/2004/315
Wang Q, Cao Z, Wang S. Formalized security model of multi-proxy signature schemes. In: Proceedings of the 5th International Conference on Computer and Information Technology. 2005, 668–672
Xu J, Zhang Z, Feng D. ID-based proxy signature using bilinear pairings. In: Proceedings of International Workshop on Information Assurance in Distributed Systems. 2005, 359–367
Author information
Authors and Affiliations
Corresponding author
Additional information
Rajeev Anand Sahu received his BSc and MSc from Guru Ghasidas University, Bilaspur, India in 2003 and 2005, respectively. He is a life member of Cryptology Research Society of India (CRSI). His area of interest is ID-Based digital signature. Presently he is pursuing his PhD from Motilal Nehru National Institute of Technology, Allabahad, India.
Sahadeo Padhye received his BSc and MSc in Mathematics form Pt. Ravishankar Shukla University, Raipur, Chhattisgarh, India in 1999 and 2001, respectively. Council of Scientific and Industrial Research (CSIR), India has granted him Junior Research Fellowship (2002–2004). He received his PhD from Pt. Ravishankar Shukla University, Raipur, India in 2006. He is a life member of Cryptology Research Society of India (CRSI) and a member of International Association of Cryptologic Research (IACR). His area of interest is public key cryptography (RSA) and digital signature. Presently he is working as assistant professor in Motilal Nehru National Institute of Technology, Allabahad, India.
Rights and permissions
About this article
Cite this article
Sahu, R.A., Padhye, S. Efficient ID-based proxy multi-signature scheme secure in random oracle. Front. Comput. Sci. 6, 421–428 (2012). https://doi.org/10.1007/s11704-012-2851-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-012-2851-y