A short ID-based proxy signature scheme

نویسندگان

  • Maryam Rajabzadeh Asaar
  • Mahmoud Salmasizadeh
  • Willy Susilo
چکیده

The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead since signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: Singh and Verma’s scheme and Yoon et al.’s scheme. Unfortunately, Tian et al. by presenting two forgery attacks show that Singh and Verma’s scheme is not secure, and also Yoon et al.’s scheme does not support provable security. The contributions of this paper are twofold. First, we review Yoon et al.’s scheme and discuss why it does not have message recovery property, and consequently it is not short. Second, we propose a short identity-based proxy signature scheme with the help of message recovery property, and show that it is secure under CDH assumption in the random oracle model. Furthermore, our scheme is more efficient than (as efficient as) previous identity-based proxy signatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of an ID-based proxy signature scheme with message recovery

ID-based message recovery signature is a kind of lightweight signature. In such a signature scheme, a complicated certification system is discarded and the total length of the message and the appended signature is also shortened. Proxy signature allows an original signer to delegate a proxy signer to sign messages on its behalf, which has found numerous practical applications such as grid compu...

متن کامل

Identity Based Threshold Proxy Signature

Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In a (t, n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperati...

متن کامل

ID-based multi-proxy multi-signature scheme from bilinear pairing

Identity-based (ID-based) public key settings are very good alternatives for the certificate based public key settings. Proxy signatures are good tools to delegate the signing capability by original signer to any other parties. The concept of bilinear pairing is very useful in many signature protocols for the ease of computation. Here, we propose an ID-based multi-proxy multi-signature scheme u...

متن کامل

Efficient ID-based multi-proxy multi-signature scheme based on CDHP

Proxy signature is useful in situation when a user wants to authorize an agent called proxy signer to sign any document on his behalf. Multi-proxy multi-signature is one of the primitives of proxy signature. Bilinear pairing makes the system efficient and provides an ease in computation. In this paper, we propose an ID-based multi-proxy multi-signature scheme from bilinear pairings based on Com...

متن کامل

Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings

Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In this paper, we propose a new ID-based blind signature scheme and an ID-based partial delegation proxy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Communication Systems

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2016