Commenced in January 2007
Paper Count: 31105
A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation
Abstract:Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of private veto, distributed proxy key generation, secure transmission of proxy key, and existentially unforgeable proxy multi-signature scheme. First, a provably secure Guillou-Quisquater proxy signature scheme is presented, then the “zero-sharing" protocol is extended over a composite modulus multiplicative group, and finally the above two are combined to realize the GQ proxy multi-signature with anonymously vetoable delegation. As a proxy signature scheme, this protocol protects both the original signers and the proxy signer. The modular design allows simplified implementation with less communication overheads and better computation performance than a general secure multi-party protocol.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1082825Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1274
 M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation," Proc. 3rd ACM conference on Computer and Communications Security, CCS-96, 1996.
 L. Yi, G. Bai, and G. Xiao, "Proxy multi-signature scheme: a new type of proxy signature scheme," Electronic Letters, Vol. 36, No. 6, pp.527- 528, 2000.
 Z. Liu, Y. Hu, and H. Ma, "Secure proxy multi-signature scheme in the standard model," Provable Security 2008, pp.127-140, 2008.
 C. Boyd, "Digital multisignature," Coding and Cryptography, 1986, pp.15-17, 1986.
 A. Kiayias and M. Yung, "Non-interactive zero-sharing with applications to private distributed decision making," Financial Cryptography 2003, pp.303-32, 2003.
 L. C. Guillou and J.-J Quisquater, "A paradoxical identity-based signature scheme resulting from zero-knowledge," Advances in Cryptology - Crypto-88, pp.216-23, 1988.
 D. Poincheval and J. Stern, "Security proofs for signature schemes," Advances in Cryptology - Eurocrypt-96, pp.387-398, 1996.
 S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," ICICS-97, pp.223-232, 1997.
 A. Fiat and A. Shamir, "How to prove yourself: practical solution to identification and signature problems," Advances in Cryptology - Crypto-86, pp.186-194, 1986.
 D. Chaum and T. P. Pedersen, "Wallet databases with observer," Advances in Cryptology - Crypto-92, pp.89-10, 1992.
 V. Shoup, "Practical threshold signatures," Advances in Cryptology - Eurocrypt-00, pp.207-220, 2000.
 D. Boneh and M. Franklin, "Efficient generation of shared RSA keys," Advances in Cryptology - Crypto-97, pp.425-439, 1997.