Skip to main content
Log in

Nonrepudiable proxy multi-signature scheme

  • Notes
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. InProc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp.48–57.

  2. Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages.IEICE Trans. Fundam., 1996, E79-A(9): 1338–1354.

    Google Scholar 

  3. Zhang K. Threshold proxy signature schemes. In1997. Information Security Workshop, Japan, 1997, pp. 191–197.

  4. Kim S, Park S, Won D. Proxy signatures, revisited. InProc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997, 1334: 223–232.

  5. Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. InIEE Proc. Computers & Digital Techniques, 1999, 146(5): 259–263.

  6. Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers.Computer Communications, 1999, 22(8): 717–722.

    Article  Google Scholar 

  7. Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1–8.

    Google Scholar 

  8. Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. InProc. the Ninth National Conference on Information Security, 1999, pp.247–253.

  9. Sun H M. Design of time-stamped proxy signatures with traceable receivers. InIEE Proc. Computers & Digital Techniques, 2000, 147(6): 462–466.

  10. Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme.Electron. Lett., 2000, 36: 527–528.

    Article  Google Scholar 

  11. Hwang S J, Shi C H. Specifiable proxy signature schemes. In1999 Computer Symposium, Taipei, 1999, pp.190–197.

  12. ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Trans., 1985, IT-31(4): 469–472.

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to JiGuo Li.

Additional information

This work is supported by the National Natural Science Foundation of China (Grant No.60072018), the National Science Fund for Distinguished Young Scholars (Grant No.60225007) and the Special Fund of China for Ph.D. Instructors in Universities (Grant No.20020248024).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, J., Cao, Z. & Zhang, Y. Nonrepudiable proxy multi-signature scheme. J. Comput. Sci. & Technol. 18, 399–402 (2003). https://doi.org/10.1007/BF02948911

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02948911

Keywords

Navigation