ID-based directed proxy signature scheme from bilinear pairings

被引:2
|
作者
Reddy, P. Vasudeva [1 ]
Rao, B. Umaprasada [1 ]
Gowri, T. [2 ]
机构
[1] Andhra Univ, Dept Engn Math, Visakhapatnam, Andhra Pradesh, India
[2] GITAM Univ, GIT, Dept Elect & Commun Engn, Visakhapatnam, Andhra Pradesh, India
关键词
ID-based signatures; proxy signatures; directed signatures; bilinear pairings;
D O I
10.1080/09720529.2010.10698311
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A proxy signature scheme allows an entity to designate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. In 2006, Sunder Lal et al. [25] proposed designated verifier proxy signatures (DVPS) by combining the concept of proxy signatures with designated verifier signatures. In which the proxy signature can only be verified by the designated verifier and the designated verifier cannot convince any other party about the validity of the signatures. But in some situations/applications, it is necessary to convince the other parties about the validity of the signature because the signed messages may also be concern to others. In this paper, an ID-based directed proxy signatures from bilinear pairings is proposed by combining the concept of proxy signatures with directed signatures in the ID-based setting. In the proposed scheme, only the designated verifier can directly verify the proxy signature generated by the proxy signer on behalf of the original signer and any other party can verify the validity of the proxy signature with the help of the proxy signer or the designated verifier. Finally, we discussed the security requirements of the proposed scheme.
引用
收藏
页码:487 / 500
页数:14
相关论文
共 50 条
  • [1] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [2] ID-based proxy signature using bilinear pairings
    Xu, J
    Zhang, ZF
    Feng, DG
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 359 - 367
  • [3] A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings
    GU Chun-xiang
    [J]. Wuhan University Journal of Natural Sciences, 2006, (01) : 193 - 197
  • [4] A new improved ID-based proxy ring signature scheme from bilinear pairings
    郎为民
    杨宗凯
    程文青
    谭运猛
    [J]. Journal of Harbin Institute of Technology(New series), 2006, (06) : 688 - 691
  • [5] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323
  • [6] A novel ID-based signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 551 - 555
  • [7] Efficient ID-based proxy chameleon signature from bilinear pairings
    Zhang, Miaomiao
    Chen, Gongliang
    Li, Jianhua
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 135 - +
  • [8] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [9] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    [J]. ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [10] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    [J]. annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662