Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30685
A Proxy Multi-Signature Scheme with Anonymous Vetoable Delegation

Authors: Pei-yih Ting, Dream-Ming Huang, Xiao-Wei Huang


Frequently a group of people jointly decide and authorize a specific person as a representative in some business/poitical occasions, e.g., the board of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, an integrated proxy multi-signature scheme that allows anonymously vetoable delegation is proposed. This protocol integrates mechanisms of private veto, distributed proxy key generation, secure transmission of proxy key, and existentially unforgeable proxy multi-signature scheme. First, a provably secure Guillou-Quisquater proxy signature scheme is presented, then the “zero-sharing" protocol is extended over a composite modulus multiplicative group, and finally the above two are combined to realize the GQ proxy multi-signature with anonymously vetoable delegation. As a proxy signature scheme, this protocol protects both the original signers and the proxy signer. The modular design allows simplified implementation with less communication overheads and better computation performance than a general secure multi-party protocol.

Keywords: GQ proxy signature, proxy multi-signature, zero-sharing protocol, secure multi-party protocol, private veto protocol

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1227


[1] M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation," Proc. 3rd ACM conference on Computer and Communications Security, CCS-96, 1996.
[2] L. Yi, G. Bai, and G. Xiao, "Proxy multi-signature scheme: a new type of proxy signature scheme," Electronic Letters, Vol. 36, No. 6, pp.527- 528, 2000.
[3] Z. Liu, Y. Hu, and H. Ma, "Secure proxy multi-signature scheme in the standard model," Provable Security 2008, pp.127-140, 2008.
[4] C. Boyd, "Digital multisignature," Coding and Cryptography, 1986, pp.15-17, 1986.
[5] A. Kiayias and M. Yung, "Non-interactive zero-sharing with applications to private distributed decision making," Financial Cryptography 2003, pp.303-32, 2003.
[6] L. C. Guillou and J.-J Quisquater, "A paradoxical identity-based signature scheme resulting from zero-knowledge," Advances in Cryptology - Crypto-88, pp.216-23, 1988.
[7] D. Poincheval and J. Stern, "Security proofs for signature schemes," Advances in Cryptology - Eurocrypt-96, pp.387-398, 1996.
[8] S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," ICICS-97, pp.223-232, 1997.
[9] A. Fiat and A. Shamir, "How to prove yourself: practical solution to identification and signature problems," Advances in Cryptology - Crypto-86, pp.186-194, 1986.
[10] D. Chaum and T. P. Pedersen, "Wallet databases with observer," Advances in Cryptology - Crypto-92, pp.89-10, 1992.
[11] V. Shoup, "Practical threshold signatures," Advances in Cryptology - Eurocrypt-00, pp.207-220, 2000.
[12] D. Boneh and M. Franklin, "Efficient generation of shared RSA keys," Advances in Cryptology - Crypto-97, pp.425-439, 1997.