Call for Paper - January 2022 Edition
IJCA solicits original research papers for the January 2022 Edition. Last date of manuscript submission is December 20, 2021. Read More

A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Pankaj Sarde, Amitabh Banerjee, C. L. Dewangan
10.5120/ijca2017912735

Pankaj Sarde, Amitabh Banerjee and C L Dewangan. A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings. International Journal of Computer Applications 157(10):1-6, January 2017. BibTeX

@article{10.5120/ijca2017912735,
	author = {Pankaj Sarde and Amitabh Banerjee and C. L. Dewangan},
	title = {A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2017},
	volume = {157},
	number = {10},
	month = {Jan},
	year = {2017},
	issn = {0975-8887},
	pages = {1-6},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume157/number10/26864-2017912735},
	doi = {10.5120/ijca2017912735},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Identity based(ID-based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key setting. Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Due to various application of the bilinear pairings in cryptography, many identity based signature scheme have been proposed. In this paper, we propose an identity based multi-proxy multi-signature scheme from bilinear pairings. The proposed scheme is more efficient than the multi proxy multi-signature scheme given by Li and Chen [2]. Moreover, The proposed scheme satisfies all the security requirements of a proxy signature given in [10]

References

  1. A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984, LNCS 196, 47-53, Springer-Verlag, 1984.
  2. X. Li and K. Chen, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Applied Mathematics and Computation, 169, 2005, pp. 437-450.
  3. D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, 213-229, Springer-Verlag, 2001.
  4. D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, 514-532, Springer-Verlag, 2001.
  5. A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, ANTS 2002, LNCS 2369, 20-32, Springer-Verlag, 2002.
  6. D.Boneh and X.Boyen, Short Signatures Without Random Oracles. Eurocrypt 2004, LNCS 3027, 56-73, Springer- Verlag, 2004.
  7. M. Mambo, K. Usuda and E. Okmamoto, Proxy signatures: delegation of the power to sign message, IEICE Transaction Functional E79-A (9), 1996, pp.1338 - 1354.
  8. S. Hwang and C. Shi, A simple multi-proxy signature scheme, Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000, pp. 134-138.
  9. S. Hwang, C. Chen, New multi-proxy multi-signature schemes, Appl. Math. Comput. 147 (2004) 5767.
  10. B. Lee, H. Kim and K. Kim, Strong proxy signature and its applications, Proceedings of SCIS, 2001, pp. 603-608.
  11. W. Wu, Y. Mu, W. Susilo, J. Seberry and X. Huang, Identitybased proxy signature from pairing: In ATC 2007, LNCS 4610, Springer 2007, pp.22-31.
  12. F. Hesss, Efficient identity based signature scheme based on pairings, SAC’2002, Springer-Verlag, LNCS 2595, pp. 310- 324.
  13. U. Maurer and Y. Yacobi, ”Non-interactive public-key cryptography”, proc. Eurocrypt ’91, pp. 498-507.
  14. S. Tsuji and T. Itoh, ”An ID-based cryptosystem based on the discrete logarithm problem”, IEEE Journal on Selected Areas in Communication, vol. 7, no. 4, pp. 467-473, 1989.
  15. H. Tanaka, ”A realization scheme for the identity-based cryptosystem”, Proc. Crypto ’87, pp. 341-349, 1987.

Keywords

ID-based signature scheme, Bilinear pairing, Multi-proxy multisignature