3rd International ICST Workshop on Trusted Collaboration

Research Article

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme

Download
425 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-03354-4_31,
        author={Fengying Li and Qingshui Xue and Jiping Zhang and Zhenfu Cao},
        title={A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme},
        proceedings={3rd International ICST Workshop on Trusted Collaboration},
        proceedings_a={TRUSTCOL},
        year={2012},
        month={5},
        keywords={},
        doi={10.1007/978-3-642-03354-4_31}
    }
    
  • Fengying Li
    Qingshui Xue
    Jiping Zhang
    Zhenfu Cao
    Year: 2012
    A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
    TRUSTCOL
    Springer
    DOI: 10.1007/978-3-642-03354-4_31
Fengying Li,*, Qingshui Xue1,*, Jiping Zhang2,*, Zhenfu Cao1,*
  • 1: Shanghai Jiao Tong University
  • 2: East China Normal University
*Contact email: fyli@sjtu.edu.cn, xue-qsh@sjtu.edu.cn, jpzhang@deit.ecnu.edu.cn, zfcao@cs.sjtu.edu.cn

Abstract

In a proxy signature scheme, one original signer delegates a proxy signer to sign messages on behalf of the original signer. When the proxy signature is created, the proxy signer generates valid proxy signatures on behalf of the original signer. Based on Cha and Cheon’s ID-based signature scheme, a model of designated-verifier proxy signature scheme from the bilinear pairing is proposed. The proposed scheme can provide the security properties of proxy protection, verifiability, strong identifiability, strong unforgeability, strong repudiability, distinguishability and prevention of misuse of proxy signing power. That is, internal attacks, external attacks, collusion attacks, equation attacks and public key substitution attacks can be resisted.