Skip to main content

Identity Based Delegation Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3715))

Abstract

Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is proposed, so that anyone can be convinced of who obtained delegation from whom in order to produce the final proxy signature. In this paper, we consider the delegation network for identity-based (ID-based) scenario. Since the public key is just a string denoting the user’s identity, certificate management is simplified. Proxy signature schemes have been devised to delegate signing authorities. We show that a trivial attempt of extending an existing ID-based proxy signature may result in an insecure scheme. After that we propose a building block of our ID-based delegation network, which is an ID-based proxy signature supporting batch verifications. Our proposed ID-based delegation network is flexible in the sense that the whole delegation network does not need to be known in advance. Our proposal is provably secure under the random oracle model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aura, T.: On the Structure of Delegation Networks. In: PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  2. Bakker, A., van Steen, M., Tanenbaum, A.S.: A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. In: Proceedings of IEEE International Symposium on Network Computing and Applications (NCA 2001), Cambridge, MA, October 8-10 (2001)

    Google Scholar 

  3. Bellare, M., Namprempre, C., Neven, G.: Security Proofs for Identity-Based Identification and Signature Schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Chen, X., Zhang, F., Kim, K.: ID-based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. In: KIISC conference (2003)

    Google Scholar 

  6. Chow, S.S.M.: Verifiable Pairing and Its Applications. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 170–187. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229–235. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  8. Ellison, C.M., Franz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, Simple Public Key Certificate, SPKI Examples. Internet draft, SPKI Working Group, Internet Engineering Task Force (September 1999)

    Google Scholar 

  9. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: Proceedings of the Fifth ACM conference on Computer and Communications Security, pp. 83–92. ACM Press, New York (1998)

    Chapter  Google Scholar 

  10. Ghodosi, H., Pieprzyk, J.: Repudiation of Cheating and Non-Repudiation of Zhang’s Proxy Signature Schemes. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol. 1587, p. 129. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  11. Herranz, J., Sáez, G.: Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 286–302. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Herranz, J., Sáez, G.: Revisiting Fully Distributed Proxy Signature Schemes. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 356–370. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Hess, F.: Efficient Identity Based Signature Schemes based on Pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. Hwang, S.-J., Chen, C.-C.: New Multi-Proxy Multi-Signature Schemes. Applied Mathematics and Computation 147(1), 57–67 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  15. Kim, S., Park, S., Won, D.: Proxy Signatures, Revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  16. Lee, B., Kim, H., Kim, K.: Secure Mobile Agent Using Strong Non-Designated Proxy Signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, p. 1. Springer, Heidelberg (2001)

    Google Scholar 

  17. Lee, N.-Y., Hwang, T., Wang, C.-H.: On Zhang’s Nonrepudiable Proxy Signature Schemes. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 415. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Leiwo, J., Hanle, C., Homburg, P., Tanenbaum, A.S.: Disallowing Unauthorized State Changes of Distributed Shared Objects. In: Qing, S., Eloff, J.H.P. (eds.) Information Security for Global Information Infrastructures. Kluwer Academic Publishers, Dordrecht (2000)

    Google Scholar 

  19. Libert, B., Quisquater, J.-J.: The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102 (2004), Available at http://eprint.iacr.org

  20. Lin, C.-Y., Wu, T.-C., Zhang, F.: A Structured Multisignature Scheme from the Gap Diffie-Hellman Group. Cryptology ePrint Archive, Report 2003/090 (2003), Available at http://eprint.iacr.org

  21. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signature: Delegation of the Power to Sign Messages. IEICE Trans. Fundamentals E79-A(9) (September 1996)

    Google Scholar 

  22. Clifford Neuman, B.: Proxy-Based Authorization and Accounting for Distributed Systems. In: Thirteenth International Conference on Distributed Computing Systems, pp. 283–291 (1993)

    Google Scholar 

  23. Okamoto, T., Tada, M., Okamoto, E.: Extended Proxy Signatures for Smart Cards. In: Zheng, Y., Mambo, M. (eds.) ISW 1999. LNCS, vol. 1729, p. 247. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  24. Pointcheval, D., Stern, J.: Security Arguments for Digital Signatures and Blind Signatures. Journal of Cryptology: The Journal of the International Association for Cryptologic Research 13(3), 361–396 (2000)

    MATH  Google Scholar 

  25. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on Pairing over Elliptic Curve. In: Proceedings of Symposium on Cryptography and Information Security (SCIS 2000) C-20 (2000)

    Google Scholar 

  26. Seo, S.-H., Lee, S.-H.: New Nominative Proxy Signature Scheme for Mobile Communication. In: Conference on Security and Protection of Information 2003, Brno, Czech Republic, April 28-30, pp. 149–154 (2003)

    Google Scholar 

  27. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  28. Solinas, J.A.: ID-based Digital Signature Algorithms. Slide Show presented at 7th Workshop on Elliptic Curve Cryptography (ECC 2003) (August 2003)

    Google Scholar 

  29. Sun, H.-M., Hsieh, B.-T., Lin, C.T.: Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme. In: Twelfth National Information Security Conference (ISC 2002) (2002)

    Google Scholar 

  30. Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security Analysis of Some Proxy Signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004); Also available at Cryptology ePrint Archive, Report 2003/196

    Chapter  Google Scholar 

  31. Xu, J., Zhang, Z., Feng, D.: ID-Based Proxy Signature Using Bilinear Pairings. Cryptology ePrint Archive, Report 2004/206 (2004), Available at http://eprint.iacr.org

  32. Yoon, H., Cheon, J.H., Kim, Y.: Batch Verifications with ID-Based Signatures. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 233–248. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  33. Zhang, F., Kim, K.: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  34. Zhang, K.: Nonrepudiable Proxy Signature Schemes, Available at http://citeseer.nj.nec.com/zhang97nonrepudiable.html

  35. Zhang, K.: Threshold Proxy Signature Schemes. In: Proceedings of the First International Information Security Workshop, pp. 282–290 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chow, S.S.M., Lui, R.W.C., Hui, L.C.K., Yiu, S.M. (2005). Identity Based Delegation Network. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology – Mycrypt 2005. Mycrypt 2005. Lecture Notes in Computer Science, vol 3715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554868_8

Download citation

  • DOI: https://doi.org/10.1007/11554868_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28938-8

  • Online ISBN: 978-3-540-32066-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics