Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.2.3

ID-based Proxy Signature Scheme from the Bilinear Map  

이정연 (한국정보통신대학원대학교 공학부 국제정보보보호연구소)
천정희 (서울대학교 자연과학대학 수리과학부)
김태성 (한국전자통신연구원 정보보호연구본부 인증기반연구팀)
진승헌 (한국전자통신연구원 정보보호연구본부 인증기반연구팀)
Abstract
Proxy signatures are signature schemes in which an original signer delegates her signing capability to a proxy entity, who signs a message on behalf of the original signer. In this paper we propose the ID-based proxy signature schemes using a bilinear map. In the previous R-based proxy signature scheme, the proxy signer can misuse the right of the signing capacity and the public key directory is required. However, by inserting the warrant information such as the identity of the proxy signer and the limit of the signing capacity to the proxy signature, our scheme can prevent the misuse of the proxy key pair by the proxy signer and does not require a public key certificate. Furthermore, our scheme dose not need a secure channel to deliver the warrant. Consequently, the proposed scheme is more efficient and useful than the previous proxy signature schemes.
Keywords
대리인서명;원서명자;디리인;bilinear 함수;ID 기반 인증모델;
Citations & Related Records
연도 인용수 순위
  • Reference
1 An Identity-based Signature from Gap Diffie-Hellman Groups /
[ J.Cha;J.Cheon ] / Advances in Cryptology, Proceedings of PKC '03, LNCS 2567
2 Strong Proxy Signature and its Applications /
[ Byoungcheon Lee;Heesun Kim;Kwangjo Kim ] / Proceedings of SCIS2001
3 Proxy Singatures, Revisited /
[ S.Kim;S.Park;D.Won ] / Proceedings of ICICS '97, LNCS 1334
4 Proxy Signature : Delegation of the Power to Sign Messages /
[ M.Mambo;K.Usuda;E.Okamoto ] / IEICE Trans. Fundamentals
5 Secure Mobile Agent using Strong Non-designated Proxy Signature /
[ Byoungcheon Lee;Heesun Kim;Kwangjo Kim ] / Proceedings of ACISP2001, LNCS 2119
6 Identity Based Encryption from the Weil Pairing /
[ D.Boneh;M.Franklin ] / Advances in Cryptology, Proceedings of CRYPTO '01, LNCS 2139
7 Identity-based Crypto systms and Signature Schemes /
[ A.Shamir ] / Advances in Cryptology, Proceedings of Crypto '84, LNCS 196
8 Security Profs for Signatures /
[ D.Pointcheval;J.Stern ] / Advances in Cryptology, Proceedings of Eurocrypt '96, LNCS 1070
9 An Identity-Based Signature Scheme with Bounded Life-Span /
[ O.Delos;J.J.Quisquater ] / Advances in Cryptology, Proceedings of CRYPTO '94, LNCS 839