Efficient Identity-Based Proxy Signature in the Standard Model

Presently, many identity-based proxy signature (IBPS) schemes have been proposed, but most of them are constructed in the random oracle model. Also, the proposed security model for IBPS is not enough complete according to Boldyreva’s work. Cao and Cao proposed an IBPS scheme in the standard model. However, their scheme is not secure because of not resisting the attack of delegator and requires more computation cost. In this paper, we present a framework for IBPS and show a detailed security model for IBPS. Under our framework, we present an efficient IBPS scheme in the standard model. Compared with other IBPS schemes, the proposed scheme has more complete security and is more efficient.

[1]  Yuefei Zhu,et al.  Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.

[2]  Shin-Jia Hwang,et al.  New threshold-proxy threshold-signature schemes , 2005, Comput. Electr. Eng..

[3]  Reihaneh Safavi-Naini,et al.  New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..

[4]  Chien-Lung Hsu,et al.  Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..

[5]  Yi Mu,et al.  Strongly unforgeable proxy signature scheme secure in the standard model , 2011, J. Syst. Softw..

[6]  Qiaoyan Wen,et al.  Certificateless multi-proxy signature , 2011, Comput. Commun..

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  L. Harn,et al.  Efficient one-time proxy signatures , 2005 .

[9]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[10]  Takeshi Okamoto,et al.  A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[11]  Kenneth G. Paterson,et al.  Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.

[12]  Georg Fuchsbauer,et al.  Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures , 2009, IACR Cryptol. ePrint Arch..

[13]  Zhenfu Cao,et al.  A secure identity-based multi-proxy signature scheme , 2009, Comput. Electr. Eng..

[14]  Kwangjo Kim,et al.  ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.

[15]  Fagen Li,et al.  A Provably Secure Proxy Signature Scheme in Certificateless Cryptography , 2010, Informatica.

[16]  Jianhong Zhang,et al.  Another Efficient Proxy Signature Scheme in the Standard Model , 2010, 2010 International Conference of Information Science and Management Engineering.

[17]  Zhijian Wang,et al.  A provably secure proxy signature scheme from bilinear pairings , 2010 .

[18]  Yi Mu,et al.  Identity-Based Proxy Signature from Pairings , 2007, ATC.

[19]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..

[20]  Dengguo Feng,et al.  ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.

[21]  Tsz Hon Yuen,et al.  ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.

[22]  Yupu Hu,et al.  Provably secure multi-proxy signature scheme with revocation in the standard model , 2011, Comput. Commun..

[23]  Dan Boneh,et al.  Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.

[24]  Hu Jianghong Cryptanalysis and Improvement of a Threshold Proxy Signature Scheme , 2012 .

[25]  Lizhong Xu,et al.  Provably Secure Certificate-based Proxy Signature Schemes , 2009, J. Comput..

[26]  Bogdan Warinschi,et al.  Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.

[27]  Zuhua Shao,et al.  Provably secure proxy-protected signature schemes based on RSA , 2009, Comput. Electr. Eng..

[28]  Kwangjo Kim,et al.  Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.

[29]  Ziba Eslami,et al.  A Certificateless Proxy Signature Scheme Secure In Standard Model , 2012 .

[30]  Harendra Singh,et al.  ID-based proxy signature scheme with message recovery , 2012, J. Syst. Softw..

[31]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[32]  Germán Sáez,et al.  Revisiting Fully Distributed Proxy Signature Schemes , 2004, INDOCRYPT.

[33]  Yi Mu,et al.  Provably secure proxy signature scheme from factorization , 2012, Math. Comput. Model..

[34]  Yuefei Zhu,et al.  An Efficient ID-Based Proxy Signature Scheme from Pairings , 2007, Inscrypt.

[35]  Fengtong Wen,et al.  An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure , 2011 .

[36]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[37]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[38]  Satoshi Obana,et al.  The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.

[39]  Zhenfu Cao,et al.  An Identity Based Proxy Signature Scheme Secure in the Standard Model , 2010, 2010 IEEE International Conference on Granular Computing.

[40]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[41]  Yi Mu,et al.  A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World , 2005, EUC Workshops.

[42]  Fengtong Wen,et al.  Improvement of a forward-secure proxy signature scheme , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[43]  Yi Mu,et al.  Proxy Signature Without Random Oracles , 2006, MSN.

[44]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[45]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[46]  Zhong Chen,et al.  On the security of an identity based multi-proxy signature scheme , 2011, Comput. Electr. Eng..