Skip to main content
Log in

Proxy multisignature scheme with (t, m) threshold shared verification

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t−1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more efficient for signature and verification etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages[J]. IEICE Trans, 1996, E79-A(9):1338–1354.

    Google Scholar 

  2. Yi L J, Bai G Q, Xiao G Z. Proxy Multisignature Scheme: A New Type of Proxy Signature Scheme[J]. Electronics Letters, 2000, 36(6): 527–528.

    Article  Google Scholar 

  3. Wang C T, Chang C C, Lin C H. Generalization of Threshold Signature and Authenticated Encryption for Group Communications[J]. IEICE Trans,2000, E83-A(6): 1228–1237.

    Google Scholar 

  4. Sun H M, Lee N Y, Hwang T. Threshold Proxy Signatures [J]. IEEE Proceedings Computers and Digital Techniques, 1999, 146(5):259–263.

    Article  Google Scholar 

  5. Hwang M S, Lu J L, Lin I C. A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem[J]. IEEE Transaction on Knowledge and Data Engineering, 2003, 15(6): 1552–1560.

    Article  Google Scholar 

  6. Sun H M. An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. Computer Communications, 1999, 22(8): 712–722.

    Google Scholar 

  7. Hsu C L, Wu T S, Wu T C. Improvements of Generalization of Threshold Signature and Authenticated Encryption for Group Communications[J]. Information Processing Letters, 2002, 81: 41–45.

    Article  Google Scholar 

  8. Hsu C L, Wu T S, Wu T C. New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers[J]. The Journal of Systems and Software, 2001, 58(9): 119–124.

    Article  Google Scholar 

  9. Wang G L, Qing S H. Weaknesses of Some Threshold Group Signature Scheme[J]. Chinese Journal of Software, 2000, 11(10):1326–1332(Ch).

    Google Scholar 

  10. Tseng Y M, Jan J K. Attacks on Threshold Signature Schemes with Traceable Signers[J]. Information Processing Letters, 1999,71:1–4.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Foundation item: Supported by the Natural Science Foundation of Guangdong Province (04300708)

Biography: WANG Xiaoming (1960-), female, Professor, Ph. D., research direction: cryptography, network security etc.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., Chen, H. & Zhang, Z. Proxy multisignature scheme with (t, m) threshold shared verification. Wuhan Univ. J. of Nat. Sci. 12, 91–94 (2007). https://doi.org/10.1007/s11859-006-0209-8

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-006-0209-8

Key words

CLC number

Navigation