ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-31 Number-1
Year of Publication : 2016
Authors : Tejeshwari Thakurh
DOI :  10.14445/22312803/IJCTT-V31P107


Tejeshwari Thakurh "ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing". International Journal of Computer Trends and Technology (IJCTT) V31(1):35-41, January 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
In this paper we first proposed an IDbased directed multi-proxy chameleon signature scheme using bilinear pairings. These schemes allow a group of proxy signers to make a valid proxy chameleon signature for a designated verifier. The designated verifiers only can easily such multi-proxy chameleon signatures generate on behalf of the original signer. Our proposed scheme is secure against existential forgery under adaptive chosen message attack assuming Computational Diffie- Hellman problem as a hard problem.

[1] G. Ateniese, B. de Medeiros, Identity-based chameleon hash and applications, FC 2004, LNCS 3110, Springer-Verlag, pp.164-180,2004.
[2] D. Boneh ,M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology 01, LNCS 2139, Springer-Verlag, pp.213-229,2001.
[3] A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, http://
[4] D. Chaum and H. van Antwerpen, Undeniable signatures, Advances in Cryptology-Crypto 1989, LNCS 435, Springer- Verlag, pp.212-216,1989.
[5] S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptative chosen- message attacks, SIAM Journal of Computing, 17(2) , pp:281-308,1988.
[6] S.D. Galbraith, K. Harrison, D. Soldera, Implementing the Tate pairings, ANTS 02, LNCS 2369, Springer-Verlag, pp.324- 337,2002.
[7] F. Hess, Efficient identity based signature schemes based on pairings, SAC 02, LNCS 2595, Springer-Verlag, pp. 310- 24,2002.
[8] S.J. Hwang, and C. H. Shi. A Simple Multi- Proxy Signature Scheme. Proceeding of the Tenth National Conference on information Security, Taiwan, pp. 134-138,2000.
[9] H. Krawczyk, T. Rabin. Chameleon hashing and signatures, Proc. of NDSS 2000 , pp.143-154.
[10] S. Lal and M. Kumar. A directed signature scheme and its applications. Proceedings of National conference on Information Security, New York, 8-9 Jan,2003, pp. 124-132.
[11] F. Li, Q. Xue, and Z. Cao Bilinear pairings based designatedverifier multi-proxy signature scheme, IT Revolutions, 2008 First Conference on, 2008.
[12] C.H. Lim, P.J. Lee, Modified Maurer-Yacobis scheme and its applications, Advances in Cryptology -AUSCRYPT92, LNCS 718, Springer-Verlag, , pp. 308-323,1992.
[13] R.Lu, X.Lim, Z.Cao, J.Shao and X.Liang, New (t,n) threshold directed signatures schemes with provable security, Information Sciences 178, pp.156-165,2008.
[14] M. Mambo, K. Usuda, E. Okamoto, Proxy signature, Delegation of the power to sign messages, In IEICE Trans.Fundamentals, E79-A, pp.1338-1353,1996.
[15] A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology- Crypto, LNCS 196, Springer-Verlag, pp. 47-53, 1984.
[16] X. Sun, Jian-hua Li, Gong-liang Chen, and Shu-tang Yung. Identity- Based Directed Signature Scheme from Bilinear Pairings. Cryptology eprint Archive, Report 2008/305, (2008).
[17] B. Rao, P. Reddy, and T. Gowri. An efficient ID-based Directed Signature Scheme from Bilinear Pairings. Cryptography e-print Archive Report 2009/617, Available at
[18] M. Yang, W. Yu-min, Directed Proxy Signature in the Standard Model, J. Shanghai Jiaotong Univ. (Sci.) 16(6), pp. 663-671,2011.
[19] M. Zhang, G.Chen,J. Li, E_cient ID-based Proxy Chameleon Signature from Bilinear Pairings, Computer and Computational Sciences, IMSCCS `06. First International Multi-symposiums,pp. 135-141,2006.
[20] F. Zhang, R. Safavi-Naini, and W. Susilo. ID-based chameleon hashes from bilinear pairings, available at Cryptology ePrint Archive: Report 2003/208, 2003.

Public Key Cryptography, Proxy Chameleon Signature, Bilinear Pairing.