Compartment-Based and Hierarchical Threshold Delegated Verifiable Accountable Subgroup Multi-signatures


Ağırtaş A. R., YAYLA O.

4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, Szczecin, Polonya, 24 - 26 Haziran 2024, cilt.14966 LNCS, ss.283-313 identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası: 14966 LNCS
  • Doi Numarası: 10.1007/978-3-031-82380-0_10
  • Basıldığı Şehir: Szczecin
  • Basıldığı Ülke: Polonya
  • Sayfa Sayıları: ss.283-313
  • Anahtar Kelimeler: accountable subgroup multi-signatures, delegation, proxy signatures, threshold secret sharing
  • Orta Doğu Teknik Üniversitesi Adresli: Evet

Özet

In this paper, we study the compartment-based and hierarchical delegation of signing power of the verifiable accountable subgroup multi-signature (vASM). ASM is a multi-signature in which the participants are accountable for the resulting signature, and the number of participants is not fixed. After Micali et al.’s and Boneh et al.’s ASM schemes, the verifiable-ASM (vASM) scheme with a verifiable group setup and more efficient verification phase was proposed recently. The verifiable group setup in vASM verifies the participants at the group setup phase. In this work, we show that the vASM scheme can also be considered as a proxy signature in which an authorized user (original signer, designator) delegates her signing rights to a single (or a group of) unauthorized user(s) (proxy signer). Namely, we propose four new constructions with the properties and functionalities of an ideal proxy signature and a compartment-based/hierarchical structure. In the first construction, we apply the vASM scheme recursively; in the second one, we use Shamir’s secret sharing (SSS) scheme; in the third construction, we use SSS again but in a nested fashion. In the last one, we use the hierarchical threshold secret sharing (HTSS) scheme for delegation. Then, we show the affiliation of our constructions to proxy signatures and compare our constructions with each other in terms of efficiency and security. Finally we compare the vASM scheme with the existing pairing-based proxy signature schemes.