A Provably Secure ID-Based Designated Verifier Proxy Signature Scheme Based on DLP

Most of the existing ID-based designated verifier proxy signature schemes are implemented with pairings. The computation of parings is still much more expensive than the common modular multiplications and exponentiations. To obtain better efficiency, we construct an efficient ID-based DVPS scheme without pairings. The scheme is designed based on the hardness of the discrete logarithm problems. It is proven secure against adaptively chosen message attacks, in the random oracle model.

[1]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[2]  Sunder Lal,et al.  Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes , 2008, IACR Cryptol. ePrint Arch..

[3]  Wang Qin,et al.  An identity-based strong designated verifier proxy signature scheme , 2006, Wuhan University Journal of Natural Sciences.

[4]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[5]  Aimei Yang ID-based designated - verifier proxy signature scheme without a trusted party , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[6]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[7]  YoungJu Choie,et al.  Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2 , 2003, ICISC.

[8]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[9]  Dongdai Lin,et al.  ID-based designated-verifier proxy signatures , 2005 .

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Xiaohu Yang,et al.  Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[12]  Ed Dawson,et al.  Identity-based strong designated verifier signature schemes: Attacks and new construction , 2009, Comput. Electr. Eng..

[13]  Yong Yu,et al.  Designated verifier proxy signature scheme without random oracles , 2009, Comput. Math. Appl..

[14]  Xiaolei Dong,et al.  Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[15]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .