Evaluation of Computationally Efficient Identity-Based Proxy Signatures

Proxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Messag...

Full description

Saved in:
Bibliographic Details
Main Authors: Saddam Hussain, Ali Tufail, Haji Awg Abdul Ghani Naim, Muhammad Asghar Khan, Gordana Barb
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Open Journal of the Computer Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11015719/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849689827519234048
author Saddam Hussain
Ali Tufail
Haji Awg Abdul Ghani Naim
Muhammad Asghar Khan
Gordana Barb
author_facet Saddam Hussain
Ali Tufail
Haji Awg Abdul Ghani Naim
Muhammad Asghar Khan
Gordana Barb
author_sort Saddam Hussain
collection DOAJ
description Proxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Message Recovery (IBPSMR), and Identity-Based Designated Verifier Signature (IBDVS). It also determines the performance of IBPS to address security requirements for delegation within resource-limited environments such as IoT devices and cloud computing. The evaluation determines performance bottlenecks while optimizing the computational complexity and communication overhead to support the practical and real-world implementation of IBPS. The findings reveal that IBPS schemes suffer from significant computation time and communication overhead due to heavy bilinear pairing operations. To evaluate and compare these schemes, we employ the Evaluation based on Distance from Average Solution (EDAS) model, which ranks the IBPS schemes according to their relative performance. The results indicate that the scheme proposed by Sarde et al., 2015 achieves the best performance, with a computation time of 6.9118 milliseconds and a communication overhead of 2464 bits. It is followed by the scheme from Jenefa and Shen et al., 2024 which records 7.7743 milliseconds and 2848 bits, and the scheme from Gu et al., 2015 with 6.2194 milliseconds and 3104 bits, respectively. Finally, we explored potential directions for future research.
format Article
id doaj-art-929f6ee9c0294e1b8b5496889e749435
institution DOAJ
issn 2644-1268
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Computer Society
spelling doaj-art-929f6ee9c0294e1b8b5496889e7494352025-08-20T03:21:30ZengIEEEIEEE Open Journal of the Computer Society2644-12682025-01-01684686110.1109/OJCS.2025.357363811015719Evaluation of Computationally Efficient Identity-Based Proxy SignaturesSaddam Hussain0https://orcid.org/0000-0003-1523-1330Ali Tufail1Haji Awg Abdul Ghani Naim2Muhammad Asghar Khan3https://orcid.org/0000-0002-1351-898XGordana Barb4https://orcid.org/0009-0001-4016-4830School of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiSchool of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiSchool of Digital Science, Universiti Brunei Darussalam, Gadong, BruneiDepartment of Electrical Engineering, Prince Mohammad Bin Fahd University, Al Khobar, Saudi ArabiaDepartment of Communications, Politehnica University Timisoara, Timisoara, RomaniaProxy signatures (PS) are important cryptographic primitives widely used in digital signature applications across various domains. This survey explores PS security solutions in Identity-Based settings, including Short Identity-Based Proxy Signature (SIBPS), Identity-Based Proxy Signature with Message Recovery (IBPSMR), and Identity-Based Designated Verifier Signature (IBDVS). It also determines the performance of IBPS to address security requirements for delegation within resource-limited environments such as IoT devices and cloud computing. The evaluation determines performance bottlenecks while optimizing the computational complexity and communication overhead to support the practical and real-world implementation of IBPS. The findings reveal that IBPS schemes suffer from significant computation time and communication overhead due to heavy bilinear pairing operations. To evaluate and compare these schemes, we employ the Evaluation based on Distance from Average Solution (EDAS) model, which ranks the IBPS schemes according to their relative performance. The results indicate that the scheme proposed by Sarde et al., 2015 achieves the best performance, with a computation time of 6.9118 milliseconds and a communication overhead of 2464 bits. It is followed by the scheme from Jenefa and Shen et al., 2024 which records 7.7743 milliseconds and 2848 bits, and the scheme from Gu et al., 2015 with 6.2194 milliseconds and 3104 bits, respectively. Finally, we explored potential directions for future research.https://ieeexplore.ieee.org/document/11015719/Identity-based signatureproxy signatureidentity-based proxy signaturecomputation timecommunication overhead
spellingShingle Saddam Hussain
Ali Tufail
Haji Awg Abdul Ghani Naim
Muhammad Asghar Khan
Gordana Barb
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
IEEE Open Journal of the Computer Society
Identity-based signature
proxy signature
identity-based proxy signature
computation time
communication overhead
title Evaluation of Computationally Efficient Identity-Based Proxy Signatures
title_full Evaluation of Computationally Efficient Identity-Based Proxy Signatures
title_fullStr Evaluation of Computationally Efficient Identity-Based Proxy Signatures
title_full_unstemmed Evaluation of Computationally Efficient Identity-Based Proxy Signatures
title_short Evaluation of Computationally Efficient Identity-Based Proxy Signatures
title_sort evaluation of computationally efficient identity based proxy signatures
topic Identity-based signature
proxy signature
identity-based proxy signature
computation time
communication overhead
url https://ieeexplore.ieee.org/document/11015719/
work_keys_str_mv AT saddamhussain evaluationofcomputationallyefficientidentitybasedproxysignatures
AT alitufail evaluationofcomputationallyefficientidentitybasedproxysignatures
AT hajiawgabdulghaninaim evaluationofcomputationallyefficientidentitybasedproxysignatures
AT muhammadasgharkhan evaluationofcomputationallyefficientidentitybasedproxysignatures
AT gordanabarb evaluationofcomputationallyefficientidentitybasedproxysignatures