An efficient certificateless multi-proxy signature scheme without pairing

In this paper, we propose the first certificateless multi-proxy signature scheme without pairing. We show our scheme is particularly suitable for practical applications with severely constrained resources due to significant reduction in costs of computation and storage and our scheme is secure against both of the Type I and the Type II adversaries.

[1]  Jianhua Chen,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.

[2]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[3]  Zhenfu Cao,et al.  Formalized security model of multi-proxy signature schemes , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[4]  Jianhua Chen,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011, Ann. des Télécommunications.

[5]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[6]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[7]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[8]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[9]  Futai Zhang,et al.  A new multi-proxy signature from bilinear pairing , 2007 .

[10]  Kwangjo Kim,et al.  ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .

[11]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[12]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[13]  Ashutosh Saxena,et al.  C R ] 2 0 D ec 2 00 6 Algorithms and Approaches of Proxy Signature : A Survey MANIK , 2008 .

[14]  Qiaoyan Wen,et al.  Certificateless multi-proxy signature , 2011, Comput. Commun..

[15]  Andrew S. Tanenbaum,et al.  A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.

[16]  He Debiao,et al.  An ID-based proxy signature schemes without bilinear pairings , 2011 .

[17]  Hu Jin,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .

[18]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.