An Anonymous Proxy Multi-signature with Accountablility

  • Vishal SaraswatEmail author
  • Rajeev Anand Sahu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 554)


A proxy signature scheme enables a signer to delegate its signing rights to any other user, called the proxy signer, to produce a signature on its behalf. In a proxy multi-signature scheme, the proxy signer can produce one single signature on behalf of multiple original signers. [18] proposed an efficient and provably secure threshold-anonymous identity-based proxy multi-signature (IBPMS) scheme which provides anonymity to the proxy signer while also providing a threshold mechanism to the original signers to expose the identity of the proxy signer in case of misuse. The scheme in [18] provided proxy anonymity using a verifiable secret sharing scheme. We propose an anonymous proxy multi-signature without the need of the verifiable secret sharing scheme when the threshold is 1. Thus we reduce the reliance on a secret sharing scheme and reduce the corresponding computation. We also save one round of communication from the original signers to the proxy signer. Thus our scheme requires significantly less operation time in the practical implementation and also increases the actual security by reducing the components available to an adversary to attack. Finally, we compare our scheme with a recently proposed anonymous proxy multi-signature scheme and other ID-based proxy multi-signature schemes, and show that our scheme requires significantly less operation time in the practical implementation and thus it is more efficient in computation than the existing schemes.


Identity-based cryptography CDHP Provable security Digital signature Signing rights delegation Proxy multi-signature Anonymity Accountability 


  1. 1.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. IACR Cryptology ePrint Archive, 2003:096 (2003)Google Scholar
  2. 2.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Cao, F., Cao, Z.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)CrossRefzbMATHGoogle Scholar
  4. 4.
    Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)CrossRefzbMATHGoogle Scholar
  5. 5.
    Debiao, H., Jianhua, C., Jin, H.: An id-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)CrossRefGoogle Scholar
  6. 6.
    He, D., Wang, J.: An anonymous but accountable proxy multi-signature scheme. J. Softw. 8(8), 1867–1874 (2013)Google Scholar
  7. 7.
    Fuchsbauer, G., Pointcheval, D.: Anonymous proxy signatures. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 201–217. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  8. 8.
    Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: NCSC, pp. 305–319 (1989)Google Scholar
  9. 9.
    Hwang, S.-J., Chen, C.-C.: A new multi-proxy multi-signature scheme. Appl. Math. Comput. 147(1), 57–67 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Hwang, S.-J., Shi, C.-H.: A simple multi-proxy signature scheme. In: NCIS, vol. 138 (2000)Google Scholar
  11. 11.
    Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proceedings of SCIS, vol. 1, pp. 603–608 (2001)Google Scholar
  12. 12.
    Lee, N.-Y., Lee, M.-F.: The security of a strong proxy signature scheme with proxy signer privacy protection. Appl. Math. Comput. 161(3), 807–812 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Lee, Y.-H., Hong, S.-M., Yoon, H.: A secure strong proxy signature scheme with proxy signer privacy protection. In: CCCT 2005. International Conference on Computing, Communications and Control Technologies (2005)Google Scholar
  14. 14.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79(9), 1338–1354 (1996)Google Scholar
  15. 15.
    MIRACL. Multiprecision integer and rational arithmetic cryptographic library.
  16. 16.
    Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992) Google Scholar
  17. 17.
    Shau, R.A., Padhye, S.: Efficient id-based proxy multi-signature scheme secure in random oracle. Front. Comput. Sci. 6(4), 421–428 (2012)MathSciNetGoogle Scholar
  18. 18.
    Saraswat, V., Sahu, R.A.: A secure anonymous proxy multi-signature scheme. In: SECRYPT 2014 - 11th International Conference on Security and Cryptography, pp. 55–66. SciTePress (2014)Google Scholar
  19. 19.
    Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  20. 20.
    Shao, Z.: Improvement of identity-based proxy multi-signature scheme. J. Syst. Softw. 82(5), 794–800 (2009)CrossRefGoogle Scholar
  21. 21.
    Shum, K., Wei, V.K.: A strong proxy signature scheme with proxy signer privacy protection. In: Enabling Technologies: Proceedings of the Eleventh IEEE International Workshops on Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 55–56. IEEE (2002)Google Scholar
  22. 22.
    Sun, H.-M., Hsieh, B.-T.: On the security of some proxy signature schemes. IACR Cryptology ePrint Archive, 2003:068 (2003)Google Scholar
  23. 23.
    Toluee, R., Asaar, M.R., Salmasizadeh, M.: An anonymous proxy signature scheme without random oracles. IACR Cryptology ePrint Archive, 2012:313 (2012)Google Scholar
  24. 24.
    Wu, K.-L., Zou, J., Wei, X.-H., Liu, F.-Y.: Proxy group signature: a new anonymous proxy signature scheme. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1369–1373 (2008)Google Scholar
  25. 25.
    Yi, L., Bai, G., Xiao, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527–528 (2000)CrossRefGoogle Scholar
  26. 26.
    Yong, Y., Chunxiang, X., Huang, X., Yi, M.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.C.R.Rao Advanced Institute of Mathematics Statistics and Computer ScienceHyderabadIndia

Personalised recommendations