Nothing Special   »   [go: up one dir, main page]

Skip to main content

An Anonymous Proxy Multi-signature with Accountablility

  • Conference paper
  • First Online:
E-Business and Telecommunications (ICETE 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 554))

Included in the following conference series:

  • 1018 Accesses

Abstract

A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. [18] proposed an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The scheme in [18] provided proxy anonymity using a verifiable secret sharing scheme. We propose an anonymous proxy multi-signature without the need of the verifiable secret sharing scheme when the threshold is 1. Thus we reduce the reliance on a secret sharing scheme and reduce the corresponding computation. We also save one round of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR Cryptology ePrint Archive, 2003:096 (2003)

    Google Scholar 

  2. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)

    Article  MATH  Google Scholar 

  4. Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)

    Article  MATH  Google Scholar 

  5. Debiao, H., Jianhua, C., Jin, H.: An id-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)

    Article  Google Scholar 

  6. He, D., Wang, J.: An anonymous but accountable proxy multi-signature scheme. J. Softw. 8(8), 1867–1874 (2013)

    Google Scholar 

  7. Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201–217. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC, pp. 305–319 (1989)

    Google Scholar 

  9. Hwang, S.-J., Chen, C.-C.: A new multi-proxy multi-signature scheme. Appl. Math. Comput. 147(1), 57–67 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  10. Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS, vol. 138 (2000)

    Google Scholar 

  11. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603–608 (2001)

    Google Scholar 

  12. Lee, N.-Y., Lee, M.-F.: The security of a strong proxy signature scheme with proxy signer privacy protection. Appl. Math. Comput. 161(3), 807–812 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  13. Lee, Y.-H., Hong, S.-M., Yoon, H.: A secure strong proxy signature scheme with proxy signer privacy protection. In: CCCT 2005. International Conference on Computing, Communications and Control Technologies (2005)

    Google Scholar 

  14. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)

    Google Scholar 

  15. MIRACL. Multiprecision integer and rational arithmetic cryptographic library. http://certivox.org/display/EXT/MIRACL

  16. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  17. Shau, R.A., Padhye, S.: Efficient id-based proxy multi-signature scheme secure in random oracle. Front. Comput. Sci. 6(4), 421–428 (2012)

    MathSciNet  Google Scholar 

  18. Saraswat, V., Sahu, R.A.: A secure anonymous proxy multi-signature scheme. In: SECRYPT 2014 - 11th International Conference on Security and Cryptography, pp. 55–66. SciTePress (2014)

    Google Scholar 

  19. Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Shao, Z.: Improvement of identity-based proxy multi-signature scheme. J. Syst. Softw. 82(5), 794–800 (2009)

    Article  Google Scholar 

  21. Shum, K., Wei, V.K.: A strong proxy signature scheme with proxy signer privacy protection. In: Enabling Technologies: Proceedings of the Eleventh IEEE International Workshops on Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 55–56. IEEE (2002)

    Google Scholar 

  22. Sun, H.-M., Hsieh, B.-T.: On the security of some proxy signature schemes. IACR Cryptology ePrint Archive, 2003:068 (2003)

    Google Scholar 

  23. Toluee, R., Asaar, M.R., Salmasizadeh, M.: An anonymous proxy signature scheme without random oracles. IACR Cryptology ePrint Archive, 2012:313 (2012)

    Google Scholar 

  24. Wu, K.-L., Zou, J., Wei, X.-H., Liu, F.-Y.: Proxy group signature: a new anonymous proxy signature scheme. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1369–1373 (2008)

    Google Scholar 

  25. Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527–528 (2000)

    Article  Google Scholar 

  26. Yong, Y., Chunxiang, X., Huang, X., Yi, M.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishal Saraswat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Saraswat, V., Sahu, R.A. (2015). An Anonymous Proxy Multi-signature with Accountablility. In: Obaidat, M., Holzinger, A., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2014. Communications in Computer and Information Science, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-319-25915-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25915-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25914-7

  • Online ISBN: 978-3-319-25915-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics