A highly efficient and identity-based proxy signature scheme without random oracle

Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing identity-based proxy signature schemes secure in the standard model, the proposed scheme has the following two advantages: shorter signature length and less computational cost. So, the proposed scheme is very suitable for application in some low resource situations.

[1]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[2]  Zhenfu Cao,et al.  An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.

[3]  Tsz Hon Yuen,et al.  Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles , 2006, IACR Cryptol. ePrint Arch..

[4]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[5]  Tsz Hon Yuen,et al.  Efficient Hierarchical Identity Based Signature in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[6]  Li Xu,et al.  Identity-Based Proxy Signature for Cloud Service in SaaS , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[7]  Sk Hafizul Islam,et al.  A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..

[8]  Weijia Jia,et al.  Efficient Identity-Based Proxy Signature in the Standard Model , 2015, Comput. J..

[9]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[10]  Dowon Hong,et al.  Identity-based proxy signature from lattices , 2013, Journal of Communications and Networks.

[11]  Fengtong Wen,et al.  An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .

[12]  Harendra Singh,et al.  ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..

[13]  Xiaoming Hu,et al.  A novel proxy key generation protocol and its application , 2007, Comput. Stand. Interfaces.

[14]  Yong Yu,et al.  On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model , 2013, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[16]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.