An identity-based proxy ring signature scheme from bilinear pairings

被引:0
|
作者
Cheng, WQ [1 ]
Lang, WM [1 ]
Yang, ZK [1 ]
Liu, G [1 ]
Tan, YM [1 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Elect & Informat Engn, Huazhong, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an identity-based proxy ring signature scheme from bilinear pairings which combines the advantages of proxy signature and of ring signature. Furthermore, our scheme can prevent the original signer form generating the proxy ring signature, thus the profits of the proxy signer are guaranteed. We introduce bilinear pairings to minimize the computation overhead and to improve the related performance of our scheme. As compared with Zhang scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced form O(n) to O(1). In addition, the proxy ring signature presented in this paper is signer ambiguous, non-forgeable, verifiable, non-repudiable and identifiable.
引用
收藏
页码:424 / 429
页数:6
相关论文
共 50 条
  • [1] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [2] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [3] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    [J]. INFORMATICA, 2010, 21 (01) : 41 - 56
  • [4] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +
  • [5] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [6] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
  • [7] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings
    Liu Xin
    Xu Qiu-liang
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
  • [8] An efficient identity-based short signature scheme from bilinear pairings
    Du, Hongzhen
    Wen, Qiaoyan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 725 - +
  • [9] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [10] A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2014, 26 (01) : 55 - 67