CFP last date
22 September 2025
Call for Paper
October Edition
IJCA solicits high quality original research papers for the upcoming October edition of the journal. The last date of research paper submission is 22 September 2025

Submit your paper
Know more
Random Articles
Reseach Article

An Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings

by Tej Singh, Rashid Ali, Musharraf Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 6
Year of Publication: 2016
Authors: Tej Singh, Rashid Ali, Musharraf Ali
10.5120/ijca2016911627

Tej Singh, Rashid Ali, Musharraf Ali . An Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings. International Journal of Computer Applications. 151, 6 ( Oct 2016), 29-32. DOI=10.5120/ijca2016911627

@article{ 10.5120/ijca2016911627,
author = { Tej Singh, Rashid Ali, Musharraf Ali },
title = { An Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 6 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number6/26240-2016911627/ },
doi = { 10.5120/ijca2016911627 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:25.044935+05:30
%A Tej Singh
%A Rashid Ali
%A Musharraf Ali
%T An Efficient Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 6
%P 29-32
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Signcryption is a cryptography primitive that fulfills both the functions of digital signature and encryption and guarantees non-repudiation, confidentiality and integrity in a more efficient way. In this paper, we propose an efficient and secure identity based multi-proxy multi signcryption scheme from bilinear pairings. In this scheme a group of proxy signcrypters could authorize by a group of original signcrypters. Then multi proxy multi signcryption could generate by the cooperation of all signcrypters in the proxy group.

References
  1. A. Shamir, Identity-based cryptosystems and signature schemes, Advancesin Cryptology—CRYPTO’84, LNCS 196, Springer-Verlag, Berlin, 1984, pp 47-53
  2. A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, Advances in Cryptology—CRYPTO’86, LNCS 263, Springer-Verlag, Berlin, 1986, pp. 186–194.
  3. L. Guillou, J.J. Quisquater, A “paradoxical” identity-based signature scheme resulting from zero-knowledge, Advances in Cryptology—CRYPTO’88, LNCS 16 403, Springer-Verlag, Berlin, 1988, pp. 216–231.
  4. D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology—CRYPTO 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 213–229.
  5. M. Mambo, K. Usuda and E. Okamoto: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundamentals, E79-A:9, pp. 1338-1353(1996)
  6. S.J. Hwang, C.C. Chen.: A New Multi-Proxy Multi-Signature Scheme. 2001 National Computer Symposium: Information Security, Taipei, Taiwan, pp. F019-F026 (2001)
  7. X. Li and K.H. Chen: Multi-proxy Signature and Proxy Multi- signature Scheme from bilinear pairing. Applied mathematics and Computation. 2005, 169(1): 437-445.
  8. Y. Zheng: Digital signcryption or how to achieve cost (signature & encryption) < cost (signature) + cost (encryption). CRYPTO’97, LNCS #1924, Springer-Verlag, pp. 165-179, (1997).
  9. J. Malone-Lee: Identity based Signcryption. Cryptology ePrint Archive, Report 2002/098, Available from: http://eprint.iacr.org/2002/098 (2002).
  10. B. Libert and J. Quisquater: A new Identity Based Signcryption Scheme from Pairings. IEEE Information Theory Workshop, pp. 155-158, Paris, France, (2003).
  11. L. Chen, J. Malone-Lee, Improved identity-based signcryption, Public Key Cryptography—PKC 2005, LNCS 3386, Springer-Verlag, Berlin, 2005, pp. 362–379.
  12. J.B. Liu and G.Z. Xiao: Multi-Proxy Multi-Signcryption Scheme from Pairings. Publishing at arxiv.org/abs/cs.CR/0509030 (2005).
  13. Sunder Lal, Tej Singh: New ID-Based Multi-Proxy Multi-Signcryption scheme from Pairings. Publishing at arxiv.org/abs/cs.CR/0509030 (2007).
  14. Zhou Xiaoyan, Wu Yan, Du Weifeng and Gao Yan: An Improved ID- Based Multi-proxy Multi –Signcryption Scheme. IEEE second international symposium on electronic commerce and security, 466-469 (2009).
Index Terms

Computer Science
Information Sciences

Keywords

Bilinear Pairings Identity-based Cryptography Signcryption Proxy Signature Multi Proxy Multi Signcryption