A New (t,n) Designated Verifier Threshold Proxy Signature Scheme in the Standard Model

Authors

1 Senior Expert, Laboratory of Information Theory and Secure Telecommunications, Faculty of Electrical Engineering, Sharif University of Technology

2 Instructor, Imam Hossein University (AS)

3 Professor, Information Theory and Secure Telecommunications Laboratory, Faculty of Electrical Engineering, Sharif University of Technology

Abstract

In a designated verifier threshold proxy signature scheme, an original signer can delegate his\her signing
power to proxy signers such that any or more out of proxy signers can sign messages on behalf of the
original signer but or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature
is issued for a designated receiver and therefore only the designated receiver can validate the proxy
signature. In this paper, we propose a new designated verifier threshold proxy signature scheme and also
show that our proposed scheme has provable security in the standard model. The security of proposed
scheme is based on the assumption.

Keywords


[1] M. Mambo, K. Usuda, E. Okamoto, "Proxy signature: Delegation of the power to sign messages", IEICE Transactions
on Fundamentals, E79-A 9 (1996), pp. 1338–1353.
[2] J. Y. Lee, J.H. Cheon, S. Kim, "An analysis of proxy signatures: Is a secure channel necessary? ", in: CT-RSA 2003,
in: LNCS, vol. 2612, Springer-Verlag, Berlin, 2003, pp. 68–79.
[3] B. Lee, H. Kim, K. Kim, "Secure mobile agent using strong nondesignated proxy signature", in: ACISP01, in: LNCS, vol. 2119, Springer-Verlag, Berlin, 2001, pp. 474–486.
[4] S. J. Kim, S. J. Park, D. H. Won, "Proxy Signatures, revisited." ICICS’97, LNCS 1334, Springer-Verlag, 1997,
pp. 223-232.
[5] K. Zhang, "Threshold proxy signature schemes," Information Security Workshop, Japan, 1997, pp. 191-197.
[6] J. Hu & J. Zhang, "Cryptanalysis & improvement of a threshold proxy signature scheme", Computer Standards &
Interfaces, 2009, pp.169–173.
[7] Z. Tan, "Improvement on C.-L Hsu et al's threshold proxy signature scheme with known signers", international Conference on ConvergenceInformation Technology, 2007, pp. 1463–1467.
[8] F. kong, J. Yu, B. Qin, M. Li, D. Li, "Security Analysis and Improvement of a (t,n) Threshold Proxy Signature Scheme" 8th ACIS International Conference on Engineering, Artificial Intelligent, Networking and Parallel\ Distributed Computing, 2007, pp. 923–926.
[9] S. H. Seo, K. A. Shim, S. H. Lee. "A mediated proxy signature scheme with fast revocation for electronic transactions".
Proceedings of the 2nd International Conference on Trust, Privacy and Security in Digital Business, Aug 22-26, 2005, Copenhagen, Denmark. LNCS 3592.Berlin, German: Springer-Verlag, 2005,pp. 216–225.
[10] M. Bellare, P. Rogaway, Random Oracles are Practical: "A Paradigm for Designing Efficient Protocols", Proceeding of the First ACM Conference on Computer and Communications Security, 1993, pp. 62–73.
[11] Boldyreva, A. Palacio and B. Warinschi, "SecureProxy Signature Schemes for Delegation of Signing Rights", http://eprint.iacr.org/2003/096.
[12] Gu, Y. Zhu, "Provable Security of ID-Based Proxy Signature Schemes", ICCNMC 2005, LNCS 3619, Springer- Verlag Heidelberg, 2005, pp. 1277–1286.
[13] H. Ji, W. Han, L. Zhao and Y. Wang, "AnIdentity-Based Proxy Signature from Bilinear Pairings", WASE International
Conference on Information Engineering, 2009, pp. 14–17.
[14] D. Boneh, X. Boyen, "Efficient selective-id secure identity based encryption without random oracles", In Proceeding
of the International Conference on Advances in Cryptology (EUROCRYPT'04), Lecture Notes in Computer Science. Springer-Verlag, 2004.
[15] B. Waters. "Efficient identity based encryption without random oracles". Proceedings of Advances in Cryptology-
Eurocrypt 2005, May 22–26, 2005, Aarhus, Denmark. LNCS 3494. Berlin, German: Springer-Verlag, 2005, pp. 114–127.
[16] X. Huang, W. Susilo, Y. Mu and W.Wu, "Proxy Signature without Random Oracles", in: MSN 2006, in: LNCS, vol.
4325, Springer-Verlag, Berlin, 2006, pp. 473–484.
[17] Y. Yu, C. Xu, X. Zhang, Y. Liao, "Designated verifier proxy signature scheme without random oracles", computers
and Mathematics with Applications 57 (2009), pp.1352 –136.
Volume 2, Issue 1 - Serial Number 1
September 2020
Pages 25-35
  • Receive Date: 09 September 2014
  • Revise Date: 03 July 2023
  • Accept Date: 19 September 2018
  • Publish Date: 22 May 2014