Hybrid proxy multisignature: A new type multi-party signature

In this paper, we introduce a new type of multi-party signature: hybrid proxy multisignature (HPM). An HPM is collaboratively generated by some signers themselves and some proxy signers on behalf of their original signers. We describe the syntax of general HPM schemes and formalize a notion of security for them. We also construct a concrete HPM scheme and prove its security in the Random Oracle Model, assuming the Co-Diffie-Hellman problem in the underlying groups equipped with a pairing is hard. The size of an HPM in our scheme is independent of the number of the actual signers. Further, the scheme has accountability, that is the signers of an HPM can be identified. Comparing with other types of multi-party signatures such as multisignature, proxy multisignature and multiproxy multisignature, HPM has more flexibility.

[1]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[2]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[3]  K. Ohta,et al.  Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security) , 1999 .

[4]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[5]  Dongho Won,et al.  Security weakness in a three-party pairing-based protocol for password authenticated key exchange , 2007, Inf. Sci..

[6]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..

[7]  Alexandra Boldyreva,et al.  Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .

[8]  Zhenfu Cao,et al.  Simulatability and security of certificateless threshold signatures , 2007, Inf. Sci..

[9]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[10]  Zuowen Tan,et al.  Provably secure delegation-by-certification proxy signature schemes , 2004, InfoSecu '04.

[11]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[12]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[13]  Silvio Micali,et al.  Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.

[14]  K. Itakura,et al.  A public-key cryptosystem suitable for digital multisignatures , 1983 .

[15]  Kuo-Yu Tsai,et al.  Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2007, Inf. Sci..

[16]  Kyung-Ah Shim,et al.  Cryptanalysis of tripartite and multi-party authenticated key agreement protocols , 2007, Inf. Sci..

[17]  Cao Zhen Formal Model of Proxy Multi-Signature and a Construction , 2006 .