Formal Security of an Identity-Based Proxy Signature Scheme in the Random Oracle Model

Currently, ID-based public key cryptography has got many useful achievements and attracted much attention. Proxy signature scheme enables an original signer to delegate his\her signing capability to a proxy signer to sign messages on behalf of the original signer. In this paper, we will theoretically discuss on the provable security of an ID-based proxy signature scheme. In fact, we analyze the ID-based proxy signature scheme proposed by Mala et al.'s and show that this scheme is secure in the random oracle model. We show that their scheme's security can be reduced to the hardness of CDHP.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[3]  Xiaolei Dong,et al.  Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[4]  Xiangxue Li,et al.  Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .

[5]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[6]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[7]  Yuefei Zhu,et al.  Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.

[8]  H. Mala,et al.  A New Identity-based Proxy Signature Scheme from Bilinear Pairings , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[9]  Yongjuan Wang,et al.  An Identity-Based Proxy Signature from Bilinear Pairings , 2009, 2009 WASE International Conference on Information Engineering.

[10]  Sang-Ho Lee,et al.  A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions , 2005, TrustBus.

[11]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.