An Anonymous Proxy Multi-signature with Accountablility

被引:0
|
作者
Saraswat, Vishal [1 ]
Sahu, Rajeev Anand [1 ]
机构
[1] CR Rao Adv Inst Math Stat & Comp Sci, Hyderabad, Andhra Pradesh, India
关键词
Identity-based cryptography; CDHP; Provable security; Digital signature; Signing rights delegation; Proxy multi-signature; Anonymity; Accountability; SECURE; SCHEME;
D O I
10.1007/978-3-319-25915-4_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. [18] proposed an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The scheme in [18] provided proxy anonymity using a verifiable secret sharing scheme. We propose an anonymous proxy multi-signature without the need of the verifiable secret sharing scheme when the threshold is 1. Thus we reduce the reliance on a secret sharing scheme and reduce the corresponding computation. We also save one round of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.
引用
收藏
页码:234 / 254
页数:21
相关论文
共 50 条
  • [21] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [22] Proxy Multi-Signature Scheme in the Standard Model
    Fan, Hai-wei
    Ming, Yang
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
  • [23] Independent verification of proxy multi-signature scheme
    College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210016, China
    [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
  • [24] Attack and Improvement of a Proxy Multi-Signature Scheme
    Wei Hong-ru
    Hu Jia-yuan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
  • [25] Independent verification of proxy multi-signature scheme
    Du, He
    Wang, Jian
    Liu, Ya-Nan
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (04) : 301 - 311
  • [26] Formal model of proxy multi-signature and a construction
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    [J]. Jisuanji Xuebao, 2006, 9 (1628-1635):
  • [27] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
  • [28] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93
  • [29] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    [J]. Journal of Electronics, 2006, (04) : 560 - 563
  • [30] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    [J]. 信息安全与通信保密, 2005, (07) : 133 - 137