The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. InProc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp.48–57.
Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages.IEICE Trans. Fundam., 1996, E79-A(9): 1338–1354.
Zhang K. Threshold proxy signature schemes. In1997. Information Security Workshop, Japan, 1997, pp. 191–197.
Kim S, Park S, Won D. Proxy signatures, revisited. InProc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997, 1334: 223–232.
Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. InIEE Proc. Computers & Digital Techniques, 1999, 146(5): 259–263.
Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers.Computer Communications, 1999, 22(8): 717–722.
Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1–8.
Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. InProc. the Ninth National Conference on Information Security, 1999, pp.247–253.
Sun H M. Design of time-stamped proxy signatures with traceable receivers. InIEE Proc. Computers & Digital Techniques, 2000, 147(6): 462–466.
Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme.Electron. Lett., 2000, 36: 527–528.
Hwang S J, Shi C H. Specifiable proxy signature schemes. In1999 Computer Symposium, Taipei, 1999, pp.190–197.
ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Trans., 1985, IT-31(4): 469–472.
This work is supported by the National Natural Science Foundation of China (Grant No.60072018), the National Science Fund for Distinguished Young Scholars (Grant No.60225007) and the Special Fund of China for Ph.D. Instructors in Universities (Grant No.20020248024).
About this article
Cite this article
Li, J., Cao, Z. & Zhang, Y. Nonrepudiable proxy multi-signature scheme. J. Comput. Sci. & Technol. 18, 399–402 (2003). https://doi.org/10.1007/BF02948911
- digital signature
- proxy signature