Evaluation of Computationally Efficient Identity-Based Proxy Signatures
Proxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Messag...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Open Journal of the Computer Society |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11015719/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849689827519234048 |
|---|---|
| author | Saddam Hussain Ali Tufail Haji Awg Abdul Ghani Naim Muhammad Asghar Khan Gordana Barb |
| author_facet | Saddam Hussain Ali Tufail Haji Awg Abdul Ghani Naim Muhammad Asghar Khan Gordana Barb |
| author_sort | Saddam Hussain |
| collection | DOAJ |
| description | Proxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Message Recovery (IBPSMR), and Identity-Based Designated Verifier Signature (IBDVS). It also determines the performance of IBPS to address security requirements for delegation within resource-limited environments such as IoT devices and cloud computing. The evaluation determines performance bottlenecks while optimizing the computational complexity and communication overhead to support the practical and real-world implementation of IBPS. The findings reveal that IBPS schemes suffer from significant computation time and communication overhead due to heavy bilinear pairing operations. To evaluate and compare these schemes, we employ the Evaluation based on Distance from Average Solution (EDAS) model, which ranks the IBPS schemes according to their relative performance. The results indicate that the scheme proposed by Sarde et al., 2015 achieves the best performance, with a computation time of 6.9118 milliseconds and a communication overhead of 2464 bits. It is followed by the scheme from Jenefa and Shen et al., 2024 which records 7.7743 milliseconds and 2848 bits, and the scheme from Gu et al., 2015 with 6.2194 milliseconds and 3104 bits, respectively. Finally, we explored potential directions for future research. |
| format | Article |
| id | doaj-art-929f6ee9c0294e1b8b5496889e749435 |
| institution | DOAJ |
| issn | 2644-1268 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Open Journal of the Computer Society |
| spelling | doaj-art-929f6ee9c0294e1b8b5496889e7494352025-08-20T03:21:30ZengIEEEIEEE Open Journal of the Computer Society2644-12682025-01-01684686110.1109/OJCS.2025.357363811015719Evaluation of Computationally Efficient Identity-Based Proxy SignaturesSaddam Hussain0https://orcid.org/0000-0003-1523-1330Ali Tufail1Haji Awg Abdul Ghani Naim2Muhammad Asghar Khan3https://orcid.org/0000-0002-1351-898XGordana Barb4https://orcid.org/0009-0001-4016-4830School of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiSchool of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiSchool of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiDepartment of Electrical Engineering, Prince Mohammad Bin Fahd University, Al Khobar, Saudi ArabiaDepartment of Communications, Politehnica University Timisoara, Timisoara, RomaniaProxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Message Recovery (IBPSMR), and Identity-Based Designated Verifier Signature (IBDVS). It also determines the performance of IBPS to address security requirements for delegation within resource-limited environments such as IoT devices and cloud computing. The evaluation determines performance bottlenecks while optimizing the computational complexity and communication overhead to support the practical and real-world implementation of IBPS. The findings reveal that IBPS schemes suffer from significant computation time and communication overhead due to heavy bilinear pairing operations. To evaluate and compare these schemes, we employ the Evaluation based on Distance from Average Solution (EDAS) model, which ranks the IBPS schemes according to their relative performance. The results indicate that the scheme proposed by Sarde et al., 2015 achieves the best performance, with a computation time of 6.9118 milliseconds and a communication overhead of 2464 bits. It is followed by the scheme from Jenefa and Shen et al., 2024 which records 7.7743 milliseconds and 2848 bits, and the scheme from Gu et al., 2015 with 6.2194 milliseconds and 3104 bits, respectively. Finally, we explored potential directions for future research.https://ieeexplore.ieee.org/document/11015719/Identity-based signatureproxy signatureidentity-based proxy signaturecomputation timecommunication overhead |
| spellingShingle | Saddam Hussain Ali Tufail Haji Awg Abdul Ghani Naim Muhammad Asghar Khan Gordana Barb Evaluation of Computationally Efficient Identity-Based Proxy Signatures IEEE Open Journal of the Computer Society Identity-based signature proxy signature identity-based proxy signature computation time communication overhead |
| title | Evaluation of Computationally Efficient Identity-Based Proxy Signatures |
| title_full | Evaluation of Computationally Efficient Identity-Based Proxy Signatures |
| title_fullStr | Evaluation of Computationally Efficient Identity-Based Proxy Signatures |
| title_full_unstemmed | Evaluation of Computationally Efficient Identity-Based Proxy Signatures |
| title_short | Evaluation of Computationally Efficient Identity-Based Proxy Signatures |
| title_sort | evaluation of computationally efficient identity based proxy signatures |
| topic | Identity-based signature proxy signature identity-based proxy signature computation time communication overhead |
| url | https://ieeexplore.ieee.org/document/11015719/ |
| work_keys_str_mv | AT saddamhussain evaluationofcomputationallyefficientidentitybasedproxysignatures AT alitufail evaluationofcomputationallyefficientidentitybasedproxysignatures AT hajiawgabdulghaninaim evaluationofcomputationallyefficientidentitybasedproxysignatures AT muhammadasgharkhan evaluationofcomputationallyefficientidentitybasedproxysignatures AT gordanabarb evaluationofcomputationallyefficientidentitybasedproxysignatures |