Abstract
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. InProc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp.48–57.
Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages.IEICE Trans. Fundam., 1996, E79-A(9): 1338–1354.
Zhang K. Threshold proxy signature schemes. In1997. Information Security Workshop, Japan, 1997, pp. 191–197.
Kim S, Park S, Won D. Proxy signatures, revisited. InProc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997, 1334: 223–232.
Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. InIEE Proc. Computers & Digital Techniques, 1999, 146(5): 259–263.
Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers.Computer Communications, 1999, 22(8): 717–722.
Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1–8.
Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. InProc. the Ninth National Conference on Information Security, 1999, pp.247–253.
Sun H M. Design of time-stamped proxy signatures with traceable receivers. InIEE Proc. Computers & Digital Techniques, 2000, 147(6): 462–466.
Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme.Electron. Lett., 2000, 36: 527–528.
Hwang S J, Shi C H. Specifiable proxy signature schemes. In1999 Computer Symposium, Taipei, 1999, pp.190–197.
ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Trans., 1985, IT-31(4): 469–472.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is supported by the National Natural Science Foundation of China (Grant No.60072018), the National Science Fund for Distinguished Young Scholars (Grant No.60225007) and the Special Fund of China for Ph.D. Instructors in Universities (Grant No.20020248024).
Rights and permissions
About this article
Cite this article
Li, J., Cao, Z. & Zhang, Y. Nonrepudiable proxy multi-signature scheme. J. Comput. Sci. & Technol. 18, 399–402 (2003). https://doi.org/10.1007/BF02948911
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02948911