Skip to main content
Top
Published in: Annals of Telecommunications 3-4/2013

01-04-2013

Efficient ID-based multiproxy multisignature without bilinear maps in ROM

Authors: Namita Tiwari, Sahadeo Padhye, Debiao He

Published in: Annals of Telecommunications | Issue 3-4/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Most of the previously proposed identity-based multiproxy multisignature (IBMPMS) schemes used pairings in their construction. But pairing is regarded as an expensive cryptographic primitive in terms of complexity. The relative computation cost of a pairing is approximately more than ten times of the scalar multiplication over elliptic curve group. So, to reduce running time, we first define a model of a secure MPMS scheme, then propose an IBMPMS scheme without using pairings. We also prove the security of our scheme against chosen message attack in random oracle model. Our scheme’s construction avoids bilinear pairing operations but still provides signature in the ID-based setting and reduces running time heavily. Therefore, proposed scheme is more applicable than previous schemes in terms of computational efficiency for practical applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shamir A (1998) Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto LNCS 196:47–53MathSciNet Shamir A (1998) Identity-based cryptosystems and signature schemes. Advances in Cryptology-Crypto LNCS 196:47–53MathSciNet
2.
go back to reference Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign messages. IEICE T Fund Electrt E79-A(9):1338–1353 Mambo M, Usuda K, Okamoto E (1996) Proxy signatures: delegation of the power to sign messages. IEICE T Fund Electrt E79-A(9):1338–1353
3.
go back to reference Das M,Saxena A and Pathak DB (2009) Algorithms and approaches of proxy signature: a survey. Int J Netw Secur 9(3):264–284 Das M,Saxena A and Pathak DB (2009) Algorithms and approaches of proxy signature: a survey. Int J Netw Secur 9(3):264–284
5.
go back to reference Guo S, Cao Z, Lu R (2006) An efficient ID-based multi-proxy multi-signature scheme. In: Proceedings of the first international multi-symposiums on computer and computational sciences (IMSCCS’06), IEEE Guo S, Cao Z, Lu R (2006) An efficient ID-based multi-proxy multi-signature scheme. In: Proceedings of the first international multi-symposiums on computer and computational sciences (IMSCCS’06), IEEE
6.
go back to reference Guo L, Wang G (2007) Insider attacks on multi-proxy multi-signature schemes. Comput Electr Eng 33:88–93MATHCrossRef Guo L, Wang G (2007) Insider attacks on multi-proxy multi-signature schemes. Comput Electr Eng 33:88–93MATHCrossRef
7.
go back to reference Hwang MS, Tzeng SF, Chiou SF (2008) An ordered multi-proxy multi-signature Scheme. Eighth international conference on intelligent systems design and applications, IEEE. doi:10.1109/ISDA.2008.189 Hwang MS, Tzeng SF, Chiou SF (2008) An ordered multi-proxy multi-signature Scheme. Eighth international conference on intelligent systems design and applications, IEEE. doi:10.​1109/​ISDA.​2008.​189
8.
go back to reference Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169:437–450MathSciNetMATHCrossRef Li X, Chen K (2005) ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl Math Comput 169:437–450MathSciNetMATHCrossRef
9.
go back to reference Sahu RA, Padhye S (2010) An ID-based multi-proxy multi-signature scheme. In: Proceeding of IEEE international conference on computer & communication technology ICCCT-2010, pp 60–63 Sahu RA, Padhye S (2010) An ID-based multi-proxy multi-signature scheme. In: Proceeding of IEEE international conference on computer & communication technology ICCCT-2010, pp 60–63
10.
go back to reference Lyuu YD, Wu ML (2005) Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes. Appl Math Comput 167:729–739MathSciNetMATHCrossRef Lyuu YD, Wu ML (2005) Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes. Appl Math Comput 167:729–739MathSciNetMATHCrossRef
11.
go back to reference Chen L, Cheng Z, Smart NP (2006) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213–241CrossRef Chen L, Cheng Z, Smart NP (2006) Identity-based key agreement protocols from pairings. Int J Inf Secur 6:213–241CrossRef
14.
go back to reference Miller V (1985) Uses of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology-CRYPTO 85, proceedings, Lecture notes in computer science. Springer, No 218, pp 417–426. Miller V (1985) Uses of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology-CRYPTO 85, proceedings, Lecture notes in computer science. Springer, No 218, pp 417–426.
16.
go back to reference Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient schemes. In: Proceedings of the 1st ACM conference on computer and communications security, pp 62–73 Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient schemes. In: Proceedings of the 1st ACM conference on computer and communications security, pp 62–73
17.
19.
go back to reference Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci 180:2895–2903MathSciNetMATHCrossRef Cao X, Kou W, Du X (2010) A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf Sci 180:2895–2903MathSciNetMATHCrossRef
20.
go back to reference Ren K, Lou W, Zeng K, Moran PJ (2007) On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun 6(11):4136–4144CrossRef Ren K, Lou W, Zeng K, Moran PJ (2007) On broadcast authentication in wireless sensor networks. IEEE Trans. Wirel. Commun 6(11):4136–4144CrossRef
Metadata
Title
Efficient ID-based multiproxy multisignature without bilinear maps in ROM
Authors
Namita Tiwari
Sahadeo Padhye
Debiao He
Publication date
01-04-2013
Publisher
Springer-Verlag
Published in
Annals of Telecommunications / Issue 3-4/2013
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-012-0315-x

Other articles of this Issue 3-4/2013

Annals of Telecommunications 3-4/2013 Go to the issue

Premium Partner