A Generic Construction of Proxy Signatures from Certificateless Signatures

The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where delegation of signing rights is common. Certificate less public key cryptography eliminates the complicated certificates in traditional public key cryptosystems without suffering from the key escrow problem in identity-based public key cryptography. In this paper, we reveal the relationship between the two important primitives of proxy signatures and certificate less signatures and present a generic conversion from the latter to the former. Following the generic transformation, we propose an efficient proxy signature scheme with a recent certificate less signature scheme.

[1]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[2]  Satoshi Obana,et al.  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.

[3]  Yi Mu,et al.  A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.

[4]  Lei Zhang,et al.  Delegation of signing rights using certificateless proxy signatures , 2012, Inf. Sci..

[5]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Lei Zhang,et al.  New Efficient Certificateless Signature Scheme , 2007, EUC Workshops.

[8]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[9]  Shouhuai Xu,et al.  Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.

[10]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[11]  Byoungcheon Lee,et al.  Strong Proxy Signature and its Applications , 2000 .

[12]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[13]  Xiaotie Deng,et al.  Key Replacement Attack Against a Generic Construction of Certificateless Signature , 2006, ACISP.

[14]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[15]  Jung Hee Cheon,et al.  An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.

[16]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[17]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[18]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[19]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .