ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing
Tejeshwari Thakurh "ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing". International Journal of Computer Trends and Technology (IJCTT) V31(1):35-41, January 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
In this paper we first proposed an IDbased
directed multi-proxy chameleon signature
scheme using bilinear pairings. These schemes allow
a group of proxy signers to make a valid proxy
chameleon signature for a designated verifier. The
designated verifiers only can easily such multi-proxy
chameleon signatures generate on behalf of the
original signer. Our proposed scheme is secure
against existential forgery under adaptive chosen
message attack assuming Computational Diffie-
Hellman problem as a hard problem.
References
[1] G. Ateniese, B. de Medeiros, Identity-based chameleon hash
and applications, FC 2004, LNCS 3110, Springer-Verlag,
pp.164-180,2004.
[2] D. Boneh ,M. Franklin, Identity-based encryption from the
Weil pairing, Advances in Cryptology 01, LNCS 2139,
Springer-Verlag, pp.213-229,2001.
[3] A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy
signature schemes for delegation of signing rights, http://
venona.antioffline.com/2003/096.
[4] D. Chaum and H. van Antwerpen, Undeniable signatures,
Advances in Cryptology-Crypto 1989, LNCS 435, Springer-
Verlag, pp.212-216,1989.
[5] S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme
secure against adaptative chosen- message attacks, SIAM
Journal of Computing, 17(2) , pp:281-308,1988.
[6] S.D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate
pairings, ANTS 02, LNCS 2369, Springer-Verlag, pp.324-
337,2002.
[7] F. Hess, Efficient identity based signature schemes based on
pairings, SAC 02, LNCS 2595, Springer-Verlag, pp. 310-
24,2002.
[8] S.J. Hwang, and C. H. Shi. A Simple Multi- Proxy Signature
Scheme. Proceeding of the Tenth National Conference on
information Security, Taiwan, pp. 134-138,2000.
[9] H. Krawczyk, T. Rabin. Chameleon hashing and signatures,
Proc. of NDSS 2000 , pp.143-154.
[10] S. Lal and M. Kumar. A directed signature scheme and its
applications. Proceedings of National conference on
Information Security, New York, 8-9 Jan,2003, pp. 124-132.
[11] F. Li, Q. Xue, and Z. Cao Bilinear pairings based designatedverifier
multi-proxy signature scheme, IT Revolutions, 2008
First Conference on, 2008.
[12] C.H. Lim, P.J. Lee, Modified Maurer-Yacobis scheme and its
applications, Advances in Cryptology -AUSCRYPT92, LNCS
718, Springer-Verlag, , pp. 308-323,1992.
[13] R.Lu, X.Lim, Z.Cao, J.Shao and X.Liang, New (t,n) threshold
directed signatures schemes with provable security,
Information Sciences 178, pp.156-165,2008.
[14] M. Mambo, K. Usuda, E. Okamoto, Proxy signature,
Delegation of the power to sign messages, In IEICE
Trans.Fundamentals, E79-A, pp.1338-1353,1996.
[15] A. Shamir, Identity-based cryptosystems and signature
schemes, Advances in Cryptology- Crypto, LNCS 196,
Springer-Verlag, pp. 47-53, 1984.
[16] X. Sun, Jian-hua Li, Gong-liang Chen, and Shu-tang Yung.
Identity- Based Directed Signature Scheme from Bilinear
Pairings. Cryptology eprint Archive, Report 2008/305, (2008).
http://eprint.iacr.org.
[17] B. Rao, P. Reddy, and T. Gowri. An efficient ID-based
Directed Signature Scheme from Bilinear Pairings.
Cryptography e-print Archive Report 2009/617, Available at
http://eprint.iacr.org.
[18] M. Yang, W. Yu-min, Directed Proxy Signature in the
Standard Model, J. Shanghai Jiaotong Univ. (Sci.) 16(6), pp.
663-671,2011.
[19] M. Zhang, G.Chen,J. Li, E_cient ID-based Proxy Chameleon
Signature from Bilinear Pairings, Computer and
Computational Sciences, IMSCCS `06. First International
Multi-symposiums,pp. 135-141,2006.
[20] F. Zhang, R. Safavi-Naini, and W. Susilo. ID-based chameleon
hashes from bilinear pairings, available at Cryptology ePrint
Archive: Report 2003/208, 2003.
Keywords
Public Key Cryptography, Proxy
Chameleon Signature, Bilinear Pairing.