Abstract
A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. [18] proposed an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The scheme in [18] provided proxy anonymity using a verifiable secret sharing scheme. We propose an anonymous proxy multi-signature without the need of the verifiable secret sharing scheme when the threshold is 1. Thus we reduce the reliance on a secret sharing scheme and reduce the corresponding computation. We also save one round of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR Cryptology ePrint Archive, 2003:096 (2003)
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)
Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)
Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)
Debiao, H., Jianhua, C., Jin, H.: An id-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)
He, D., Wang, J.: An anonymous but accountable proxy multi-signature scheme. J. Softw. 8(8), 1867–1874 (2013)
Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201–217. Springer, Heidelberg (2008)
Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC, pp. 305–319 (1989)
Hwang, S.-J., Chen, C.-C.: A new multi-proxy multi-signature scheme. Appl. Math. Comput. 147(1), 57–67 (2004)
Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS, vol. 138 (2000)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603–608 (2001)
Lee, N.-Y., Lee, M.-F.: The security of a strong proxy signature scheme with proxy signer privacy protection. Appl. Math. Comput. 161(3), 807–812 (2005)
Lee, Y.-H., Hong, S.-M., Yoon, H.: A secure strong proxy signature scheme with proxy signer privacy protection. In: CCCT 2005. International Conference on Computing, Communications and Control Technologies (2005)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)
MIRACL. Multiprecision integer and rational arithmetic cryptographic library. http://certivox.org/display/EXT/MIRACL
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Shau, R.A., Padhye, S.: Efficient id-based proxy multi-signature scheme secure in random oracle. Front. Comput. Sci. 6(4), 421–428 (2012)
Saraswat, V., Sahu, R.A.: A secure anonymous proxy multi-signature scheme. In: SECRYPT 2014 - 11th International Conference on Security and Cryptography, pp. 55–66. SciTePress (2014)
Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008)
Shao, Z.: Improvement of identity-based proxy multi-signature scheme. J. Syst. Softw. 82(5), 794–800 (2009)
Shum, K., Wei, V.K.: A strong proxy signature scheme with proxy signer privacy protection. In: Enabling Technologies: Proceedings of the Eleventh IEEE International Workshops on Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 55–56. IEEE (2002)
Sun, H.-M., Hsieh, B.-T.: On the security of some proxy signature schemes. IACR Cryptology ePrint Archive, 2003:068 (2003)
Toluee, R., Asaar, M.R., Salmasizadeh, M.: An anonymous proxy signature scheme without random oracles. IACR Cryptology ePrint Archive, 2012:313 (2012)
Wu, K.-L., Zou, J., Wei, X.-H., Liu, F.-Y.: Proxy group signature: a new anonymous proxy signature scheme. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1369–1373 (2008)
Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527–528 (2000)
Yong, Y., Chunxiang, X., Huang, X., Yi, M.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Saraswat, V., Sahu, R.A. (2015). An Anonymous Proxy Multi-signature with Accountablility. In: Obaidat, M., Holzinger, A., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2014. Communications in Computer and Information Science, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-319-25915-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-25915-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25914-7
Online ISBN: 978-3-319-25915-4
eBook Packages: Computer ScienceComputer Science (R0)