Articles

Directed Proxy Signature in the Standard Model

Expand
  • (1. School of Information Engineering, Chang'an University, Xi'an 710064, China;
    2. Shaanxi Road Traffic Detection and Equipment Engineering Research
    Center, Chang'an University, Xi'an 710064, China;
    3. State Key Laboratory of Integrated Service Network, Xidian
    University, Xi'an 710071, China) 

Received date: 2010-11-15

  Online published: 2012-01-12

Abstract

 restricted verification ability.  Directed signatures
allow only a designated verifier to check the validity of the
signature issued to him, and at the time of trouble or if necessary,
any third party can verify the signature with the help of the signer
or the designated verifier. Directed signature schemes are widely
used in situations where the receiver's privacy should be protected.
Proxy signatures allow an entity to delegate its signing capability
to another entity in such a way that the latter can sign message on
behalf of the former when the former is not available. Proxy
signature schemes have found numerous practical applications such as
distributed systems and mobile agent applications. In this paper, we
firstly define the notion of the directed proxy signature by
combining the proxy signature and directed signature. Then, we
formalize its security model and present a concrete scheme in the
standard model. Finally, we use the techniques from provable
security to show that the proposed scheme is unforgeable under the
gap Diffie-Hellman assumption, and invisible under the decisional
Diffie-Hellman assumption.

Cite this article

MING Yang (明 洋), WANG Yu-min (王育民) . Directed Proxy Signature in the Standard Model[J]. Journal of Shanghai Jiaotong University(Science), 2011 , 16(6) : 663 -671 . DOI: 10.1007/s12204-011-1208-2

References

1  Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the

power to sign messages [J].  IEICE Transactions on Fundamentals

of Electronics, Communicaions and Computer Sciences, 1996,    

E79-A   (9): 1338-1354.

2  Kim S, Park S, Won D. Proxy signatures, revisited [C]//

Proceedings of the International Conference on Information and

Communications Security. Berlin: Springer-Verlag, 1997: 223-232.

3  Okamoto T, Tada M, Okamoto E. Extended proxy signatures for smart

cards [C]//  Proceedings of the Information Security Workshop.

Berlin: Springer-Verlag, 1999: 247-258.

4  Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated

proxy signature [C]//  Proceedings of the Australasian

Conference on Information Security and Privacy. Berlin:

Springer-Verlag, 2001: 474-486.

5  Lee J Y, Cheon J H, Kim S. An analysis of proxy

signatures: Is a secure channel necessary? [C]//  Proceedings of

the Cryptographer's Track at RSA Conference.   Berlin:

Springer-Verlag, 2003: 68-79.

6  Wang   Gui-lin, Bao   Feng, Zhou   Jian-yin, et al. Security

analysis of some proxy signatures [C]//  Proceedings of the

International Conference on Information and Communications

Security. Berlin: Springer-Verlag, 2003: 305-319.

7  Huang   X, Mu   Y, Susilo W, et al. Proxy signature without

random oracles [C]//  Proceedings of the International

Conference on Mobile Ad-hoc and Sensor Networks. Berlin:

Springer-Verlag, 2006: 473-484.

8  Cao   F, Cao   Z. A secure identity-based multi-proxy signature

scheme [J].  Computers     &    Electrical Engineering, 2009, 35  (1): 86-95.

9  Chaum D, Van Antwerpen H. Undeniable signatures [C]//

Proceedings of Crypto. Berlin: Springer-Verlag, 1990: 212-216.

10  Chaum D. Designated confirmer signatures [C]//  Proceedings of Eurocrypt. Berlin: Springer-Verlag, 1994: 86-91.

11  Chen   X, Zhang   F, Kim K. Limited verifier signature

from bilinear pairings [C]//  Proceedings of the International

Conference on Applied Cryptography and Network Security. Berlin:

Springer-Verlag, 2004: 135-148.

12  Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and

their applications [C]//  Proceedings of Eurocrypt. Berlin:

Springer-Verlag, 1996: 143-154.

13  Lim C H, Lee P J. Modified Maurer-Yacobi's scheme and its

applications [C]//  Proceedings of the Australasian Conference

on Information Security and Privacy. Berlin: Springer-Verlag, 1992:

308-323.

14  Lal S, Kumar M. A directed signature scheme and its applications

[EB/OL]. (2004-9-19) [2010-12-30].

http://arxiv.org/ftp/cs/papers/0409/0409036.pdf.

15  Sunder L, Manoj K. A directed threshold-signature scheme [EB/OL].

(2004-11-02) [2010-12-30].

http://arxiv.org/ftp/cs/papers/0411/0411005.pdf.

16  Laguillaumie F, Paillier P, Vergnaud D. Universally convertible

directed signatures [C]//  Proceedings of Asiacrypt. Berlin:

Springer-Verlag, 2005: 682-701.

17  Lu   R, Cao   Z. A directed signature scheme based on RSA

assumption [J].  International Journal of Network Security  ,

2006, 2  (3): 182-421.

18  Lu   R, Lin   X, Cao   Z, et al. New (t, n)

threshold directed signature scheme with provable security [J].

Information Sciences, 2008, 178  (3): 756-765.

19  Wei   Q, He   J, Shao   H. A directed signature scheme

and its application to group key initial distribution [C]//

Proceedings of the International Conference on Interaction Sciences:

Information Technology, Culture and Human. Seoul, Korea: ACM Press,

2009: 265-269.

20  Reddy P V, Rao B U, Gowri T. ID-based directed threshold

multisignature scheme from bilinear pairings [J].  International

Journal on Computer Science and Engineering, 2009, 2  (1):

74-79.

21  Zhang   J, Yang   Y, Niu   X. Efficient provable

secure ID-based directed signature scheme without random oracle

[C]//  Proceedings of the International Symposium on Neural

Networks. Berlin: Springer-Verlag, 2009: 318-327.

22  Waters R. Efficient identity-based encryption without random oracles

[C]//  Proceedings of Eurocrypt. Berlin: Springer-Verlag, 2005:

114-127.
Options
Outlines

/