An Efficient and Provably Secure Proxy Signature Scheme

Article Preview

Abstract:

As a concept of delegating signing rights for digital signatures, proxy signature is a well studied subject in cryptography. Proxy signature is an important delegation technique. It plays an important role in auto-office system. In this paper, we give a secure and efficient proxy signature scheme. The security of the scheme is base on the fixed inversion problem of bilinear map. It has the following advantages: simple construction, short size and low computation.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 211-212)

Pages:

876-880

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Jou, The Weil and Tate pairings as building blocks for public key cryptosystems, Algorithmic number theory (Sydney, 2002), pp.20-32, LNCS. 2369, Springer, Berlin, (2002).

DOI: 10.1007/3-540-45455-1_3

Google Scholar

[2] K. Zhang. Threshold proxy signature schemes. In Proc. 1st International Information Security Workshop, (1997), pp.282-290.

Google Scholar

[3] Byoungcheon Lee, Heesun Kim, and Kwangjo Kim. Strong proxy signature and its application. In SCIS2001, (2001), pp.603-608.

Google Scholar

[4] M. Mambo, K. Usuda, E. Okamoto,. Proxy Signatures: Delegation of the Power to Sign Message[J]. IEICE Trans. Fundam, E79-A(9), (1996), pp.1338-1354.

Google Scholar

[5] M. Mambo, K. Usuda, E. Okamoto, Proxy Signature for Delegating Signing Operation. ACM96, New York (1996) , pp.48-57.

DOI: 10.1145/238168.238185

Google Scholar

[6] Takeshi Okamoto, Atsuo Inomata, and Eiji Okamoto. A proposal of short proxy signature using pairing. In ITCC (1), IEEE Computer Society, 2005, pp.631-635.

DOI: 10.1109/itcc.2005.27

Google Scholar

[7] Takeshi Okamoto, Mitsuru Tada, and Eiji Okamoto. Extended proxy signatures for smart cards. In Masahiro Mambo and Yuliang Zheng, editors, ISW, volume 1729 of LNCS, (1999), pp.247-258.

DOI: 10.1007/3-540-47790-x_21

Google Scholar

[8] HungMin Sun. An efficient nonrepudiable threshold proxy signature scheme with known signers. Computer Communications, vol. 22(8), (1999), pp.717-722.

DOI: 10.1016/s0140-3664(99)00029-8

Google Scholar

[9] GuilinWang, Designated-verifier proxy signature schemes. SEC2005, LNCS 2413, (2005), pp.409-424.

Google Scholar

[10] Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Security analysis of some proxy signatures. In Jong In Lim and Dong Hoon Lee, editors, ICISC, LNCS 2971, (2003), pp.305-319.

DOI: 10.1007/978-3-540-24691-6_23

Google Scholar

[11] Huaxiong Wang and Josef Pieprzyk. Efficient one-time proxy signatures. In Chi Sung Laih, editor, ASIACRYPT, LNCS2894, (2003) pp.507-522. Springer.

DOI: 10.1007/978-3-540-40061-5_32

Google Scholar

[12] Fangguo Zhang and Kwangjo Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. ACISP2003, LNCS2727, (2003) , pp.312-323. Springer.

DOI: 10.1007/3-540-45067-x_27

Google Scholar

[13] Fangguo Zhang, Reihaneh Safavi-Naini, and Chih-Yin Lin. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing. Cryptology ePrint Archive, Report 2003/104, 2003. http: /eprint. iacr. org.

DOI: 10.1007/1-4020-7987-7_8

Google Scholar