Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Nonrepudiable proxy multi-signature scheme

  • 37 Accesses

  • 21 Citations

Abstract

The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer. However, most existing proxy signature schemes do not support nonrepudiation. In this paper, two secure nonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of the existing schemes. The proposed schemes can withstand public key substitution attack. In addition, the new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. This approach can also be applied to other ElGamal-like proxy signature schemes.

This is a preview of subscription content, log in to check access.

References

  1. [1]

    Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. InProc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp.48–57.

  2. [2]

    Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages.IEICE Trans. Fundam., 1996, E79-A(9): 1338–1354.

  3. [3]

    Zhang K. Threshold proxy signature schemes. In1997. Information Security Workshop, Japan, 1997, pp. 191–197.

  4. [4]

    Kim S, Park S, Won D. Proxy signatures, revisited. InProc. ICICS'97, Int. Conf. on Information and Communications Security, LNCS, Springer-Verlag, 1997, 1334: 223–232.

  5. [5]

    Sun H M, Lee N Y, Hwang T. Threshold proxy signatures. InIEE Proc. Computers & Digital Techniques, 1999, 146(5): 259–263.

  6. [6]

    Sun H M. An efficient nonrepudiable threshold proxy signature scheme with known signers.Computer Communications, 1999, 22(8): 717–722.

  7. [7]

    Hwang M S, Lin I C, Lu E J L. A secure nonrepudiable threshold proxy signature scheme with known signers.International Journal of Informatica, 2000, 11(2): 1–8.

  8. [8]

    Sun H M, Chen B J. Time-stamped proxy signatures with traceable receivers. InProc. the Ninth National Conference on Information Security, 1999, pp.247–253.

  9. [9]

    Sun H M. Design of time-stamped proxy signatures with traceable receivers. InIEE Proc. Computers & Digital Techniques, 2000, 147(6): 462–466.

  10. [10]

    Yi L J, Bai G Q, Xiao G Z. Proxy multi-signature scheme: A new type of proxy signature scheme.Electron. Lett., 2000, 36: 527–528.

  11. [11]

    Hwang S J, Shi C H. Specifiable proxy signature schemes. In1999 Computer Symposium, Taipei, 1999, pp.190–197.

  12. [12]

    ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Trans., 1985, IT-31(4): 469–472.

Download references

Author information

Correspondence to JiGuo Li.

Additional information

This work is supported by the National Natural Science Foundation of China (Grant No.60072018), the National Science Fund for Distinguished Young Scholars (Grant No.60225007) and the Special Fund of China for Ph.D. Instructors in Universities (Grant No.20020248024).

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Li, J., Cao, Z. & Zhang, Y. Nonrepudiable proxy multi-signature scheme. J. Comput. Sci. & Technol. 18, 399–402 (2003). https://doi.org/10.1007/BF02948911

Download citation

Keywords

  • nonrepudiable
  • digital signature
  • proxy signature
  • multi-signature