Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.3.17

Improvement in efficiency on ID-based Delegation Network  

Youn, Taek-Young (Korea University)
Jeong, Sang-Tae (Inha University)
Park, Young-Ho (Sejong Cyber University)
Abstract
Delegation of signing capability is a common practice in various applications. Mambo et al. proposed a proxy signatures as a solutions for delegation of signing capability. Proxy signatures allow a designated proxy signer to sign on behalf of an original signer. After the concept of proxy signature scheme is proposed, many variants are proposed to support more general delegation setting. To capture all possible delegation structures, the concept of delegation network was proposed by Aura. ID-based cryptography, which is suited for flexible environment, is desirable to construct a delegation network. Chow et al proposed an ID-based delegation network. In the computational point of view, their solution requires E pairing operations and N elliptic curve scalar multiplications where E and N are the number of edges and nodes in a delegation structure, respectively. In this paper, we proposed an efficient ID-based delegation network which requires only E pairing operations. Moreover, we can design a modified delegation network that requires only N pairing operations.
Keywords
Delegation Network; Proxy Signature; ID-Based Cryptosystem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, volume 2656 of Lecture Notes in Computer Science, pages 416-432. Springer
2 Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, and S.M. Yiu, Identity Based Delegation Network, Mycrypt 2005, LNCS 3715, pp.99-115, 2005
3 Min-Shiang Hwang, Eric Jui-Lin Lu, and Iuon-Chang Lin, A Practical (t,n)-Threshold Proxy Signature Scheme Based on the RSA Cryptosystem, IEEE Transactions on Knowledge and Data Engineering, VOL.15, NO.6, November/December 2003
4 M. Mambo, K. Usuda, and E. Okamoto, Proxy Signatures for Delegating Signing Operation, Proc. 3rd ACM Conference on Computer and Communications Security, 1996
5 H.-M.Sun, N.-Y.Lee, and T.Hwang, Threshold proxy signatures, IEE Proc. Computers and Digital Techniques, Vol.146, No.5, September, 1999
6 Jing Xu, Zhenfeng Zhang, and Dengguo Feng, ID-Based Proxy Signature Using Bilinear Pairings, Cryptology ePrint Archive, Report 2004/206, 2004. Available at http://eprint.iacr.org
7 Shin-Jia Hwang, and Chiu-Chin Chen, New Multi-Proxy Multi-Signature Schemes, Applied Mathematics and Computation, 147(1):57-67, 2004   DOI   ScienceOn
8 So-Young Park, and Sang-Ho Lee, Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations, HSI 2005, LNCS 3597, pp. 340-344, 2005
9 Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng, Comments on 'A Practical $(t,n)$ Threshold Proxy Signature Scheme Based on the RSA Cryptosystem', IEEE Transactions on Knowledge and Data Engineering, VOL. 16, NO. 10, OCTOBER 2004
10 Q. Xue and Z. Cao, Improved of Multi-proxy Signature Scheme, Proceeding of International Symposium on Communications and Information Technologies, pp.450-455, 2004
11 Tuomas Aura, On the Structure of Delegation Networks, In PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, 1998
12 Wen-Chung Kuo, and Ming-Yang Chen, A Modified (t, n)-Threshold Proxy Signature Scheme Based on the RSA Cryptosystem, Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05), 2005
13 Xiangxue Li, Kefei Chen, Longjun Zhang, and Shiqun Li, Proxy Structured Multisignature Scheme from Bilinear Pairings, ISPA 2004, LNCS 3358, pp. 705-714, 2004
14 Lijang Yi, Guoqiaiig Bai, and Guozhen Xiao, Proxy multi-signature scheme: A new type of proxy signature scheme, Electronics Letters, 16th, March 2000, Vol.36, No.6, 2000
15 Qingshui Xue, and Zhenfu Cao, A Threshold Proxy Signature Scheme Using Self-Certified Public Keys, ISPA 2004, LNCS 3358, pp.715-724, 2004