A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
[1] M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating
signing operation," Proc. 3rd ACM conference on Computer and
Communications Security, CCS-96, 1996.
[2] L. Yi, G. Bai, and G. Xiao, "Proxy multi-signature scheme: a new type
of proxy signature scheme," Electronic Letters, Vol. 36, No. 6, pp.527-
528, 2000.
[3] Z. Liu, Y. Hu, and H. Ma, "Secure proxy multi-signature scheme in the
standard model," Provable Security 2008, pp.127-140, 2008.
[4] C. Boyd, "Digital multisignature," Coding and Cryptography, 1986,
pp.15-17, 1986.
[5] A. Kiayias and M. Yung, "Non-interactive zero-sharing with applications
to private distributed decision making," Financial Cryptography 2003,
pp.303-32, 2003.
[6] L. C. Guillou and J.-J Quisquater, "A paradoxical identity-based signature
scheme resulting from zero-knowledge," Advances in Cryptology -
Crypto-88, pp.216-23, 1988.
[7] D. Poincheval and J. Stern, "Security proofs for signature schemes,"
Advances in Cryptology - Eurocrypt-96, pp.387-398, 1996.
[8] S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," ICICS-97,
pp.223-232, 1997.
[9] A. Fiat and A. Shamir, "How to prove yourself: practical solution
to identification and signature problems," Advances in Cryptology -
Crypto-86, pp.186-194, 1986.
[10] D. Chaum and T. P. Pedersen, "Wallet databases with observer," Advances
in Cryptology - Crypto-92, pp.89-10, 1992.
[11] V. Shoup, "Practical threshold signatures," Advances in Cryptology -
Eurocrypt-00, pp.207-220, 2000.
[12] D. Boneh and M. Franklin, "Efficient generation of shared RSA keys,"
Advances in Cryptology - Crypto-97, pp.425-439, 1997.
[1] M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating
signing operation," Proc. 3rd ACM conference on Computer and
Communications Security, CCS-96, 1996.
[2] L. Yi, G. Bai, and G. Xiao, "Proxy multi-signature scheme: a new type
of proxy signature scheme," Electronic Letters, Vol. 36, No. 6, pp.527-
528, 2000.
[3] Z. Liu, Y. Hu, and H. Ma, "Secure proxy multi-signature scheme in the
standard model," Provable Security 2008, pp.127-140, 2008.
[4] C. Boyd, "Digital multisignature," Coding and Cryptography, 1986,
pp.15-17, 1986.
[5] A. Kiayias and M. Yung, "Non-interactive zero-sharing with applications
to private distributed decision making," Financial Cryptography 2003,
pp.303-32, 2003.
[6] L. C. Guillou and J.-J Quisquater, "A paradoxical identity-based signature
scheme resulting from zero-knowledge," Advances in Cryptology -
Crypto-88, pp.216-23, 1988.
[7] D. Poincheval and J. Stern, "Security proofs for signature schemes,"
Advances in Cryptology - Eurocrypt-96, pp.387-398, 1996.
[8] S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," ICICS-97,
pp.223-232, 1997.
[9] A. Fiat and A. Shamir, "How to prove yourself: practical solution
to identification and signature problems," Advances in Cryptology -
Crypto-86, pp.186-194, 1986.
[10] D. Chaum and T. P. Pedersen, "Wallet databases with observer," Advances
in Cryptology - Crypto-92, pp.89-10, 1992.
[11] V. Shoup, "Practical threshold signatures," Advances in Cryptology -
Eurocrypt-00, pp.207-220, 2000.
[12] D. Boneh and M. Franklin, "Efficient generation of shared RSA keys,"
Advances in Cryptology - Crypto-97, pp.425-439, 1997.
@article{"International Journal of Information, Control and Computer Sciences:63357", author = "Pei-yih Ting and Dream-Ming Huang and Xiao-Wei Huang", title = "A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation", abstract = "Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.", keywords = "GQ proxy signature, proxy multi-signature, zero-sharing
protocol, secure multi-party protocol, private veto protocol", volume = "3", number = "5", pages = "1461-6", }