Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings

  • Qin Wang
  • Zhenfu Cao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)


In this paper, based on bilinear pairings, we would like to construct an identity based proxy signature scheme and an identity based proxy signcryption scheme without secure channel. We also analyze the two proposed schemes from efficiency point of view and show that they are more efficient than the existed ones. What’s more, our proposed schemes satisfy all of the security requirements to proxy signature and proxy signcryption schemes assuming the CDH problem and BDH problem are hard to solve.


Signature Scheme Proxy Signature Bilinear Pairing Modular Exponentiation Proxy Signature Scheme 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  2. 2.
    Lee, J., Cheon, J., Kim, S.: An Analysis of Proxy Signatures:Is a Secure Channel Necessary? In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 68–79. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Chen, L., Lee, J.M.: Improved Identity-Based Signcryption. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 362–379. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Lee, J.M., Mao, W.: Two Birds One Stone: Signcryption using RSA. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 211–225. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Bao, F., Deng, R.H.: A Signcryption Scheme with Signature Directly Verifiable by Public Key. In: Imai, H., Zheng, Y. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 55–59. Springer, Berlin (1998)CrossRefGoogle Scholar
  8. 8.
    Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  9. 9.
    Gamage, C., Leiwo, J., Zheng, Y.: An Efficient Scheme for Secure Message Transmission Using Proxy-Signcryption. In: 22nd Australasian Computer Science Conference, pp. 420–431. Springer, Berlin (1999)Google Scholar
  10. 10.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Trans. on Fundamentals E79-A(9), 1338–1354 (1996)Google Scholar
  11. 11.
    Zhang, F.G., Safavi-Naini, R., Lin, C.Y.: New Proxy Signature. Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing (2003),
  12. 12.
    Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Li, X., Chen, K.: Identity Based Proxy-Signcryption Sheme from Pairings. In: Proceedings of the 2004 IEEE International Conference on Services Computing, pp. 494–497. IEEE Comuter Society, Los Alamitos (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Qin Wang
    • 1
  • Zhenfu Cao
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations