Abstract
Proxy signature is an active research area in cryptography. In order to save the running time and the size of the signature, recently a provable secure proxy signature scheme without bilinear pairings has been proposed which is based on elliptic curve discrete log problem (ECDLP). In this paper, we point out some forgery attacks and security issues on this scheme. Furthermore, we also improve the scheme to make it secure against these forgeries. Our scheme is as efficient as previous proposed scheme.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. (6), 213–241 (2007)
Cao, X., Kou, W.: A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges. Information Sciences (2010), doi:10.1016/j.ins.2010.04.002
David, P., Jacque, S.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosenmessage attacks. SIAM J. Comput. 17(2), 281–308 (1988)
Granger, R., Page, D., Smart, N.P.: High security pairing-based cryptography revisited. In: Algorit. Numb. Theo. Sympo. VII, pp. 480–494 (2006)
Gu, C., Zhu, Y.: Provable security of ID-based proxy signature schemes. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 1277–1286. Springer, Heidelberg (2005)
Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt 2007. LNCS, vol. 4990, pp. 40–50. Springer, Heidelberg (2008)
He, D., Chen, J., Hu, J.: An ID-Based proxy signature schemes without bilinear pairings. Anna Telicom (2011), doi:10.1007/s12243-011-0244-0
Ji, H., Han, W., Zhao, L., et al.: An identity-based proxy signature from bilinear pairings. In: 2009 WASE International Conference on Information Engineering, pp. 14–17 (2009)
Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Cryptog. and Infor. Secur., Canada, pp. 307–312 (2001)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign message. IEICE Transactions Fundamentals E79-A(9), 1338–1353 (1996)
The Certicom Corporation, SEC 2:Recommended Elliptic Curve Domain Parameters, http://www.secg.org/collateral/sec2_final.pdf
Shamus Software Ltd., Miracl library, http://www.shamus.ie/index.php?page=home
Tiwari, N., Padhye, S.: Provable secure proxy signature scheme without bilinear pairings. Int. J. Commun. Syst. (2011), doi:10.1002/dac.1367
Wang, A., Li, J., Wang, Z.: A provably secure proxy signature scheme from bilinear pairings. J. Electro. (china)1 27(3) (2010)
Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 22–31. Springer, Heidelberg (2007)
Zhang, J., Zou, W.: Another ID-based proxy signature scheme and its extension. Wuhan Univ. J. Nat. Sci. 12, 133–136 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Padhye, S., Tiwari, N. (2013). Improved Proxy Signature Scheme without Bilinear Pairings. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_59
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)