CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure ID-based Proxy Signature Scheme from Bilinear Pairings

by Pankaj Sarde, Amitabh Banerjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 9
Year of Publication: 2015
Authors: Pankaj Sarde, Amitabh Banerjee
10.5120/ijca2015905395

Pankaj Sarde, Amitabh Banerjee . A Secure ID-based Proxy Signature Scheme from Bilinear Pairings. International Journal of Computer Applications. 124, 9 ( August 2015), 1-4. DOI=10.5120/ijca2015905395

@article{ 10.5120/ijca2015905395,
author = { Pankaj Sarde, Amitabh Banerjee },
title = { A Secure ID-based Proxy Signature Scheme from Bilinear Pairings },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 9 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number9/22136-2015905395/ },
doi = { 10.5120/ijca2015905395 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:54.294237+05:30
%A Pankaj Sarde
%A Amitabh Banerjee
%T A Secure ID-based Proxy Signature Scheme from Bilinear Pairings
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 9
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer is not available to sign a specific document. In this paper, we propose a secure an identity based proxy signature scheme from bilinear pairings. The proposed scheme satisfy all the security property of proxy signature scheme.

References
  1. A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of CRYPTO84, volume 196 of LNCS, pages 4753. Springer-Verlag, 1984.
  2. A. Joux, A one round protocol for tripartite Diffie-Hellman, In Proc. of ANTS-IV, volume 1838 of LNCS, pages 385-394, 2000.
  3. D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing. In Proc. of CRYPTO01, volume 2139 of LNCS, pages 213229. Springer-Verlag, 2001
  4. M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures: Delegation of the power to sign messages, IEICE Trans., 1996, E79-A, (9), pp. 1338-1354.
  5. B. Lee, H. Kim, and K. Kim, Secure mobile agent using strong non-designated proxy signature, In: Information Security and Privacy (ACISP01), LNCS 2119, pp. 474-486. Springer-Verlag, 2001.
  6. J.-Y. Lee, J. H. Cheon, and S. Kim, An analysis of proxy signatures: Is a secure channel necessary? In: Topics in Cryptology - CT-RSA 2003, LNCS 2612, pp. 68-79. Springer-Verlag, 2003.
  7. M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation. In: Proc. of 3rd ACM Conference on Computer and Communications Security (CCS96), pp. 48-57. ACM Press, 1996.
  8. G. Wang, F. Bao, J. Zhou, and R. H. Deng, Security analysis of some proxy signatures. In: Information Security and Cryptology - ICISC 2003, LNCS 2971, pp. 305-319. Springer- Verlag, 2004.
  9. J. Xu, Z. Zhang, and D. Feng, ID-Based Proxy Signature Using Bilinear Pairings, Available at http://eprint.iacr.org/2004/206/
  10. F. Zhang, and K. Kim, Efficient ID-based blind signature and proxy signature from bilinear pairings, in Proceedings of Australasian Conference on Information Security and Privacy, LNCS 2727, Springer-Verlag, pp.312-323, 2003
  11. H. M. Sun and B. T. Hsieh, On the security of some proxy signature schemes, Available at http://eprint.iacr.org/2003/068.
  12. J.C. Cha and J.H. Cheon, An identity-based signature from gap Diffie-Hellman groups, Public Key Cryptography - PKC 2003, LNCS 2139, pp.18-30, Springer- Verlag, 2003.
  13. F. Hess, Efficient identity based signature schemes based on pairings, SAC 2002, LNCS 2595, pp.310-324, Springer- Verlag, 2002.
  14. Wang, G., Designated-verifier proxy signature schemes, in: Security and privacy in the age of ubiquitous computing. Proc. of 20th Int. Conf. on Information Security (IFIP/SEC 2005), pp. 409-423
  15. K.G. Paterson, ID-based signatures from pairings on elliptic curves, Electron. Lett., Vol.38, No.18, pp.1025-1026, 2002.
  16. R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, SCIS 2000-C20, Jan. 2000, Okinawa, Japan.
Index Terms

Computer Science
Information Sciences

Keywords

Proxy Signature Bilinear Pairings ID-Based Cryptography