ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Multi-proxy signature allows the original signer delegate his singing power to a group of proxy signers. Blind proxy-signature allows the user to obtain a signature of a message from several signers in a way that each signer learns neither the message nor the resulting signature. Plenty of multi-proxy signature and blind multisignature schemes have been proposed under the certificate-based (CA-based) public key systems. In this paper, we firstly propose an identity-based (IDbased) multi-proxy signature scheme and an ID-based blind multisignature scheme from bilinear pairings. Since there seems no ID-based threshold signature schemes up to now, both the proposed schemes can be regarded as a special case of corresponding variants of ID-based threshold signature.

[1]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[2]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[3]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[4]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[5]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[8]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[9]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[10]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[11]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[12]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Alexandra Boldyreva,et al.  Efficient threshold signature , multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme , 2002 .

[15]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[16]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[17]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..