Abstract
Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al.’s pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign message. IEICE Trans Funct, 1996, E79-A(9): 1338–1354
Mambo M, Usuda K, Okamoto E. Proxy signatures for delegation signing operation. In: Proc. Third ACM Conference on Computer and Communication Security, New Delhi, India, January 1996. 48–57
Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers. Compu Commu, 1999, 22(8): 717–722
Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. IEE Proc Compu Dig Tech, 1999, 146(5): 259–263
Yi L, Bai G, Xiao G. Proxy multi-signature scheme: A new type of proxy signature scheme. Electr Lett, 2000, 36(6): 527–528
Hwang S J, Chen C C. A new proxy multi-signature scheme. In: International Workshop on Cryptology and Network Security, Taipei, December 2000. 134–138
Hsu C L, Wu T S, Wu T C. New nonrepudiable threshold proxy signature scheme with known signers. J Syst Software, 2001, 58(2): 119–124
Shao Z. Proxy signature schemes based on factoring. Inf Proc Lett, 2003, 85(3): 137–143
Lu R, Cao Z, Zhou Y. Proxy blind multi-signature scheme without a secure channel. Appl Math Comput, 2005, 164(1): 179–187
Lu R, Cao Z, Zhu H. A robust (k, n) + 1 threshold proxy signature scheme based on factoring. Appl Math Comput, 2005, 166(1): 35–45
Zhang F, Safavi-Naini R, Susilo W. An efficient signature scheme from bilinear pairings and its applications. In: Lecture Notes in Computer Science, Vol. 2947. Berlin: Springer-Verlag, 2004. 277–290
Boneh D, Lynn B, Shacham H. Short signature from the Weil pairing. In: Lecture Notes in Computer Science, Vol. 2248. Berlin: Springer-Verlag, 2001. 514–532
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Lecture Notes in Computer Science, Vol. 2139. Berlin: Springer-Verlag, 2001. 213–229
Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proc. First ACM Conference on Computer and Communication Security, Fairfax, Virginia, USA, 1993. 62–73
Boneh D, Gentry C, Lynn B, et al. Aggregrate and verfiably encrypted signatures from bilinear maps. In: Lecture Notes in Computer Science, Vol. 2656. Berlin: Springer-Verlag, 2003. 416–432
Schnorr CP. Efficient identification and signatures for smart cards. In: Lecture Notes in Computer Science, Vol. 435. Berlin: Springer-Verlag, 1990. 235–251
Pointcheval D, Stern J. Security proofs for signature schemes. In: Lecture Notes in Computer Science, Vol. 1070. Berlin: Springer-Verlag, 1996. 387–398
Yi X. Identity-based fault-tolerant conference key agreement. IEEE Trans Depend Secure Comput, 2004, 1(3): 170–178
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (Grant Nos. 60572155 and 60673079), the National High Technology Development Program of China (Grant No. 2006AA01Z424), and the National Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060248008)
Rights and permissions
About this article
Cite this article
Lu, R., Dong, X. & Cao, Z. Designing efficient proxy signature schemes for mobile communication. Sci. China Ser. F-Inf. Sci. 51, 183–195 (2008). https://doi.org/10.1007/s11432-008-0017-1
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s11432-008-0017-1