×

Designing efficient proxy signature schemes for mobile communication. (English) Zbl 1137.94010

Summary: Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on D. Boneh, B. Lynn and H. Shacham [Asiacrypt 2001, Lect. Notes Comput. Sci. 2248, 514–532 (2001; Zbl 1064.94554)] pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment.

MSC:

94A62 Authentication, digital signatures and secret sharing
11T71 Algebraic coding theory; cryptography (number-theoretic aspects)
14G50 Applications to coding theory and cryptography of arithmetic geometry

Citations:

Zbl 1064.94554
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans Fund Electr Commun Comput Sci, 1996, E79-A: 1338-1354
[2] Lee B, Kim H, Kim K. Secure mobile agent using strong non-designated proxy signature. In: Information Security and Privacy-ACISP2001, LNCS 2119. Berlin: Springer-Verlag, 2001. 474-486 · Zbl 0994.68562
[3] Lu R, Dong X, Cao Z. Designing efficient proxy signature schemes for mobile communication. Sci China Ser F-Inf Sci, 2008, 51: 183-195 · Zbl 1137.94010
[4] Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Advances in Cryptology-ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001. 514-532 · Zbl 1064.94554
[5] Boneh D,
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.