Skip to main content

An Anonymous Proxy Multi-signature with Accountablility

  • Conference paper
  • First Online:
E-Business and Telecommunications (ICETE 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 554))

Included in the following conference series:

  • 1004 Accesses

Abstract

A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. [18] proposed an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The scheme inĀ [18] provided proxy anonymity using a verifiable secret sharing scheme. We propose an anonymous proxy multi-signature without the need of the verifiable secret sharing scheme when the threshold is 1. Thus we reduce the reliance on a secret sharing scheme and reduce the corresponding computation. We also save one round of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR Cryptology ePrint Archive, 2003:096 (2003)

    Google ScholarĀ 

  2. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57ā€“115 (2012)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  3. Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292ā€“302 (2009)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  4. Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895ā€“2903 (2010)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  5. Debiao, H., Jianhua, C., Jin, H.: An id-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11ā€“12), 657ā€“662 (2011)

    ArticleĀ  Google ScholarĀ 

  6. He, D., Wang, J.: An anonymous but accountable proxy multi-signature scheme. J. Softw. 8(8), 1867ā€“1874 (2013)

    Google ScholarĀ 

  7. Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201ā€“217. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  8. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC, pp. 305ā€“319 (1989)

    Google ScholarĀ 

  9. Hwang, S.-J., Chen, C.-C.: A new multi-proxy multi-signature scheme. Appl. Math. Comput. 147(1), 57ā€“67 (2004)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  10. Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS, vol. 138 (2000)

    Google ScholarĀ 

  11. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603ā€“608 (2001)

    Google ScholarĀ 

  12. Lee, N.-Y., Lee, M.-F.: The security of a strong proxy signature scheme with proxy signer privacy protection. Appl. Math. Comput. 161(3), 807ā€“812 (2005)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  13. Lee, Y.-H., Hong, S.-M., Yoon, H.: A secure strong proxy signature scheme with proxy signer privacy protection. In: CCCT 2005. International Conference on Computing, Communications and Control Technologies (2005)

    Google ScholarĀ 

  14. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338ā€“1354 (1996)

    Google ScholarĀ 

  15. MIRACL. Multiprecision integer and rational arithmetic cryptographic library. http://certivox.org/display/EXT/MIRACL

  16. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129ā€“140. Springer, Heidelberg (1992)

    Google ScholarĀ 

  17. Shau, R.A., Padhye, S.: Efficient id-based proxy multi-signature scheme secure in random oracle. Front. Comput. Sci. 6(4), 421ā€“428 (2012)

    MathSciNetĀ  Google ScholarĀ 

  18. Saraswat, V., Sahu, R.A.: A secure anonymous proxy multi-signature scheme. In: SECRYPT 2014 - 11th International Conference on Security and Cryptography, pp. 55ā€“66. SciTePress (2014)

    Google ScholarĀ 

  19. Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141ā€“161. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  20. Shao, Z.: Improvement of identity-based proxy multi-signature scheme. J. Syst. Softw. 82(5), 794ā€“800 (2009)

    ArticleĀ  Google ScholarĀ 

  21. Shum, K., Wei, V.K.: A strong proxy signature scheme with proxy signer privacy protection. In: Enabling Technologies: Proceedings of the Eleventh IEEE International Workshops on Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 55ā€“56. IEEE (2002)

    Google ScholarĀ 

  22. Sun, H.-M., Hsieh, B.-T.: On the security of some proxy signature schemes. IACR Cryptology ePrint Archive, 2003:068 (2003)

    Google ScholarĀ 

  23. Toluee, R., Asaar, M.R., Salmasizadeh, M.: An anonymous proxy signature scheme without random oracles. IACR Cryptology ePrint Archive, 2012:313 (2012)

    Google ScholarĀ 

  24. Wu, K.-L., Zou, J., Wei, X.-H., Liu, F.-Y.: Proxy group signature: a new anonymous proxy signature scheme. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1369ā€“1373 (2008)

    Google ScholarĀ 

  25. Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527ā€“528 (2000)

    ArticleĀ  Google ScholarĀ 

  26. Yong, Y., Chunxiang, X., Huang, X., Yi, M.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348ā€“353 (2009)

    ArticleĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Saraswat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saraswat, V., Sahu, R.A. (2015). An Anonymous Proxy Multi-signature with Accountablility. In: Obaidat, M., Holzinger, A., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2014. Communications in Computer and Information Science, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-319-25915-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25915-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25914-7

  • Online ISBN: 978-3-319-25915-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics