Abstract
With the increasing maturity of (t, n) threshold signatures and proxy signatures, (t, n) threshold proxy signatures have been increasingly studied. The (t, n) threshold proxy signature scheme allows t or more proxy signers in a proxy group to sign messages on behalf of the original signer, but less than t signers cannot. In this paper, by studying a (t, n) threshold proxy signature scheme, we find that their scheme cannot resist forgery attack and does not meet the requirements of anonymity and traceability. Therefore, we propose an improved (t, n) threshold proxy signature scheme which remedies the security problems mentioned above. It is proved by analysis that our scheme not only can resist forgery attack, collusion attack and public-key substitute attack, but also has anonymity, distinguishability, and traceability. Moreover, the improved signature scheme is ultimately somewhat lower in terms of computational complexity.
Supported by the National Natural Science Foundation of China, Grant Nos. 61771294, 61202475.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_37
Zhao, L.S., Liu, J.M.: (t, n) threshold digital signature scheme with traceable signers against conspiracy attacks. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 649–651. IEEE (2013)
Gu, K., Wang, Y., Wen, S.: Traceable threshold proxy signature. J. Inf. Sci. Eng. 33(1), 63–79 (2017)
Wang, X., Ning, Z., Wang, W., Yang, Y.: Anti-conspiracy attack threshold signature model and protocol paper retracted. Int. J. Wirel. Mob. Comput. 17(3), 300–306 (2019)
Kurek, R.: Efficient forward-secure threshold signatures. In: Aoki, K., Kanaoka, A. (eds.) IWSEC 2020. LNCS, vol. 12231, pp. 239–260. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58208-1_14
Duong, D.H., Tran, H.T., Susilo, W., et al.: An efficient multivariate threshold ring signature scheme. Comput. Stand. Interfaces 74, 103489 (2021)
Guo, R., Cheng, X.: Cryptanalysis and improvement of a (t, n) threshold group signature scheme. Quantum Inf. Process. 21(1), 1–9 (2022)
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0028478
Sun, H.M.: An efficient nonrepudiable threshold proxy signature scheme with known signers. Comput. Commun. 22(8), 717–722 (1999)
Hsu, C.L., Wu, T.S., Wu, T.C.: New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 58(2), 119–124 (2001)
Yang, C.Y., Tzeng, S.F., Hwang, M.S.: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Softw. 73(3), 507–514 (2004)
Hu, J., Zhang, J.: Cryptanalysis and improvement of a threshold proxy signature scheme. Comput. Stand. Interfaces 31(1), 169–173 (2009)
Liu, D., Wang, L., Wang, C., Huo, P.: A nonrepudiable threshold proxy signature scheme against forgery attack. In: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, pp. 76–80 (2017)
Li, J.G., Cao, Z.F.: Improvement of a threshold proxy signature scheme. J. Comput. Res. Dev. 39(11), 515–518 (2002)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (Research on the theory and application of quantum coherent resources (No. 61771294)), the National Natural Science Foundation of China (Design and security proof of leak-tolerant public key encryption (No. 61202475)).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, Y., Liu, F. (2022). Improved (t,n)-Threshold Proxy Signature Scheme. In: Chen, X., Huang, X., Kutyłowski, M. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2022. Communications in Computer and Information Science, vol 1663. Springer, Singapore. https://doi.org/10.1007/978-981-19-7242-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-19-7242-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7241-6
Online ISBN: 978-981-19-7242-3
eBook Packages: Computer ScienceComputer Science (R0)