Abstract
A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t−1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more efficient for signature and verification etc.
Similar content being viewed by others
References
Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans, 1996, E79-A(9):1338–1354.
Yi L J, Bai G Q, Xiao G Z. Proxy Multisignature Scheme: A New Type of Proxy Signature Scheme[J]. Electronics Letters, 2000, 36(6): 527–528.
Wang C T, Chang C C, Lin C H. Generalization of Threshold Signature and Authenticated Encryption for Group Communications[J]. IEICE Trans,2000, E83-A(6): 1228–1237.
Sun H M, Lee N Y, Hwang T. Threshold Proxy Signatures [J]. IEEE Proceedings Computers and Digital Techniques, 1999, 146(5):259–263.
Hwang M S, Lu J L, Lin I C. A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem[J]. IEEE Transaction on Knowledge and Data Engineering, 2003, 15(6): 1552–1560.
Sun H M. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communications, 1999, 22(8): 712–722.
Hsu C L, Wu T S, Wu T C. Improvements of Generalization of Threshold Signature and Authenticated Encryption for Group Communications[J]. Information Processing Letters, 2002, 81: 41–45.
Hsu C L, Wu T S, Wu T C. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. The Journal of Systems and Software, 2001, 58(9): 119–124.
Wang G L, Qing S H. Weaknesses of Some Threshold Group Signature Scheme[J]. Chinese Journal of Software, 2000, 11(10):1326–1332(Ch).
Tseng Y M, Jan J K. Attacks on Threshold Signature Schemes with Traceable Signers[J]. Information Processing Letters, 1999,71:1–4.
Author information
Authors and Affiliations
Additional information
Foundation item: Supported by the Natural Science Foundation of Guangdong Province (04300708)
Biography: WANG Xiaoming (1960-), female, Professor, Ph. D., research direction: cryptography, network security etc.
Rights and permissions
About this article
Cite this article
Wang, X., Chen, H. & Zhang, Z. Proxy multisignature scheme with (t, m) threshold shared verification. Wuhan Univ. J. of Nat. Sci. 12, 91–94 (2007). https://doi.org/10.1007/s11859-006-0209-8
Received:
Issue Date:
DOI: https://doi.org/10.1007/s11859-006-0209-8