CFP last date
22 April 2024
Reseach Article

A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings

by Pankaj Sarde, Amitabh Banerjee, C. L. Dewangan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 157 - Number 10
Year of Publication: 2017
Authors: Pankaj Sarde, Amitabh Banerjee, C. L. Dewangan
10.5120/ijca2017912735

Pankaj Sarde, Amitabh Banerjee, C. L. Dewangan . A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings. International Journal of Computer Applications. 157, 10 ( Jan 2017), 1-6. DOI=10.5120/ijca2017912735

@article{ 10.5120/ijca2017912735,
author = { Pankaj Sarde, Amitabh Banerjee, C. L. Dewangan },
title = { A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 157 },
number = { 10 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume157/number10/26864-2017912735/ },
doi = { 10.5120/ijca2017912735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:03:31.231506+05:30
%A Pankaj Sarde
%A Amitabh Banerjee
%A C. L. Dewangan
%T A Secure and an Efficient ID-based Multi-Proxy Multi-Signature Scheme from Bilinear Pairings
%J International Journal of Computer Applications
%@ 0975-8887
%V 157
%N 10
%P 1-6
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Identity based(ID-based) public key cryptosystem gives an efficient alternative for key management as compared to certificate based public key setting. Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. Due to various application of the bilinear pairings in cryptography, many identity based signature scheme have been proposed. In this paper, we propose an identity based multi-proxy multi-signature scheme from bilinear pairings. The proposed scheme is more efficient than the multi proxy multi-signature scheme given by Li and Chen [2]. Moreover, The proposed scheme satisfies all the security requirements of a proxy signature given in [10]

References
  1. A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984, LNCS 196, 47-53, Springer-Verlag, 1984.
  2. X. Li and K. Chen, ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings, Applied Mathematics and Computation, 169, 2005, pp. 437-450.
  3. D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS 2139, 213-229, Springer-Verlag, 2001.
  4. D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, 514-532, Springer-Verlag, 2001.
  5. A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, ANTS 2002, LNCS 2369, 20-32, Springer-Verlag, 2002.
  6. D.Boneh and X.Boyen, Short Signatures Without Random Oracles. Eurocrypt 2004, LNCS 3027, 56-73, Springer- Verlag, 2004.
  7. M. Mambo, K. Usuda and E. Okmamoto, Proxy signatures: delegation of the power to sign message, IEICE Transaction Functional E79-A (9), 1996, pp.1338 - 1354.
  8. S. Hwang and C. Shi, A simple multi-proxy signature scheme, Proceedings of the 10th national conference on information security, Hualien, Taiwan, ROC; 2000, pp. 134-138.
  9. S. Hwang, C. Chen, New multi-proxy multi-signature schemes, Appl. Math. Comput. 147 (2004) 5767.
  10. B. Lee, H. Kim and K. Kim, Strong proxy signature and its applications, Proceedings of SCIS, 2001, pp. 603-608.
  11. W. Wu, Y. Mu, W. Susilo, J. Seberry and X. Huang, Identitybased proxy signature from pairing: In ATC 2007, LNCS 4610, Springer 2007, pp.22-31.
  12. F. Hesss, Efficient identity based signature scheme based on pairings, SAC’2002, Springer-Verlag, LNCS 2595, pp. 310- 324.
  13. U. Maurer and Y. Yacobi, ”Non-interactive public-key cryptography”, proc. Eurocrypt ’91, pp. 498-507.
  14. S. Tsuji and T. Itoh, ”An ID-based cryptosystem based on the discrete logarithm problem”, IEEE Journal on Selected Areas in Communication, vol. 7, no. 4, pp. 467-473, 1989.
  15. H. Tanaka, ”A realization scheme for the identity-based cryptosystem”, Proc. Crypto ’87, pp. 341-349, 1987.
Index Terms

Computer Science
Information Sciences

Keywords

ID-based signature scheme Bilinear pairing Multi-proxy multisignature