Skip to main content

Improved (t,n)-Threshold Proxy Signature Scheme

  • Conference paper
  • First Online:
Security and Privacy in Social Networks and Big Data (SocialSec 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1663))

  • 507 Accesses

Abstract

With the increasing maturity of (tn) threshold signatures and proxy signatures, (tn) threshold proxy signatures have been increasingly studied. The (tn) threshold proxy signature scheme allows t or more proxy signers in a proxy group to sign messages on behalf of the original signer, but less than t signers cannot. In this paper, by studying a (tn) threshold proxy signature scheme, we find that their scheme cannot resist forgery attack and does not meet the requirements of anonymity and traceability. Therefore, we propose an improved (tn) threshold proxy signature scheme which remedies the security problems mentioned above. It is proved by analysis that our scheme not only can resist forgery attack, collusion attack and public-key substitute attack, but also has anonymity, distinguishability, and traceability. Moreover, the improved signature scheme is ultimately somewhat lower in terms of computational complexity.

Supported by the National Natural Science Foundation of China, Grant Nos. 61771294, 61202475.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_37

    Chapter  Google Scholar 

  2. Zhao, L.S., Liu, J.M.: (t, n) threshold digital signature scheme with traceable signers against conspiracy attacks. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 649–651. IEEE (2013)

    Google Scholar 

  3. Gu, K., Wang, Y., Wen, S.: Traceable threshold proxy signature. J. Inf. Sci. Eng. 33(1), 63–79 (2017)

    MathSciNet  Google Scholar 

  4. Wang, X., Ning, Z., Wang, W., Yang, Y.: Anti-conspiracy attack threshold signature model and protocol paper retracted. Int. J. Wirel. Mob. Comput. 17(3), 300–306 (2019)

    Article  Google Scholar 

  5. Kurek, R.: Efficient forward-secure threshold signatures. In: Aoki, K., Kanaoka, A. (eds.) IWSEC 2020. LNCS, vol. 12231, pp. 239–260. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58208-1_14

    Chapter  Google Scholar 

  6. Duong, D.H., Tran, H.T., Susilo, W., et al.: An efficient multivariate threshold ring signature scheme. Comput. Stand. Interfaces 74, 103489 (2021)

    Article  Google Scholar 

  7. Guo, R., Cheng, X.: Cryptanalysis and improvement of a (t, n) threshold group signature scheme. Quantum Inf. Process. 21(1), 1–9 (2022)

    Article  MathSciNet  Google Scholar 

  8. Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028478

    Chapter  Google Scholar 

  9. Sun, H.M.: An efficient nonrepudiable threshold proxy signature scheme with known signers. Comput. Commun. 22(8), 717–722 (1999)

    Article  Google Scholar 

  10. Hsu, C.L., Wu, T.S., Wu, T.C.: New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 58(2), 119–124 (2001)

    Article  Google Scholar 

  11. Yang, C.Y., Tzeng, S.F., Hwang, M.S.: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 73(3), 507–514 (2004)

    Article  Google Scholar 

  12. Hu, J., Zhang, J.: Cryptanalysis and improvement of a threshold proxy signature scheme. Comput. Stand. Interfaces 31(1), 169–173 (2009)

    Article  Google Scholar 

  13. Liu, D., Wang, L., Wang, C., Huo, P.: A nonrepudiable threshold proxy signature scheme against forgery attack. In: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, pp. 76–80 (2017)

    Google Scholar 

  14. Li, J.G., Cao, Z.F.: Improvement of a threshold proxy signature scheme. J. Comput. Res. Dev. 39(11), 515–518 (2002)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Research on the theory and application of quantum coherent resources (No. 61771294)), the National Natural Science Foundation of China (Design and security proof of leak-tolerant public key encryption (No. 61202475)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yaodong Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Liu, F. (2022). Improved (t,n)-Threshold Proxy Signature Scheme. In: Chen, X., Huang, X., Kutyłowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7242-3_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7241-6

  • Online ISBN: 978-981-19-7242-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics