An ID-based proxy signature schemes without bilinear pairings

The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company, or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Many identity-based proxy signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, in this letter, we propose an identity-based signature scheme without bilinear pairings. With the running time being saved greatly, our scheme is more practical than the previous related schemes for practical application.

[1]  Yuefei Zhu,et al.  Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.

[2]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[3]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[4]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[5]  Yuefei Zhu,et al.  An Efficient ID-Based Proxy Signature Scheme from Pairings , 2007, Inscrypt.

[6]  Jianhong Zhang,et al.  Another ID-based proxy signature scheme and its extension , 2006, Wuhan University Journal of Natural Sciences.

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Hu Jin,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .

[9]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[10]  Yi Mu,et al.  Identity-Based Proxy Signature from Pairings , 2007, ATC.

[11]  Yongjuan Wang,et al.  An Identity-Based Proxy Signature from Bilinear Pairings , 2009, 2009 WASE International Conference on Information Engineering.

[12]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[13]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.