ID-based directed proxy signature scheme from bilinear pairings

被引:2
|
作者
Reddy, P. Vasudeva [1 ]
Rao, B. Umaprasada [1 ]
Gowri, T. [2 ]
机构
[1] Andhra Univ, Dept Engn Math, Visakhapatnam, Andhra Pradesh, India
[2] GITAM Univ, GIT, Dept Elect & Commun Engn, Visakhapatnam, Andhra Pradesh, India
关键词
ID-based signatures; proxy signatures; directed signatures; bilinear pairings;
D O I
10.1080/09720529.2010.10698311
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A proxy signature scheme allows an entity to designate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. In 2006, Sunder Lal et al. [25] proposed designated verifier proxy signatures (DVPS) by combining the concept of proxy signatures with designated verifier signatures. In which the proxy signature can only be verified by the designated verifier and the designated verifier cannot convince any other party about the validity of the signatures. But in some situations/applications, it is necessary to convince the other parties about the validity of the signature because the signed messages may also be concern to others. In this paper, an ID-based directed proxy signatures from bilinear pairings is proposed by combining the concept of proxy signatures with directed signatures in the ID-based setting. In the proposed scheme, only the designated verifier can directly verify the proxy signature generated by the proxy signer on behalf of the original signer and any other party can verify the validity of the proxy signature with the help of the proxy signer or the designated verifier. Finally, we discussed the security requirements of the proposed scheme.
引用
收藏
页码:487 / 500
页数:14
相关论文
共 50 条
  • [1] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [2] ID-based proxy signature using bilinear pairings
    Xu, J
    Zhang, ZF
    Feng, DG
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 359 - 367
  • [4] Efficient ID-based blind signature and proxy signature from bilinear pairings
    Zhang, FG
    Kim, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 312 - 323
  • [5] A novel ID-based signature scheme from bilinear pairings
    Chen, XF
    Zhang, FG
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 551 - 555
  • [6] Efficient ID-based proxy chameleon signature from bilinear pairings
    Zhang, Miaomiao
    Chen, Gongliang
    Li, Jianhua
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 135 - +
  • [7] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [8] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) : 657 - 662
  • [9] An ID-based proxy signature schemes without bilinear pairings
    He Debiao
    Chen Jianhua
    Hu Jin
    annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
  • [10] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):