Security Analysis of a Threshold Proxy Signature Scheme

نویسندگان

  • Kitae Kim
  • Daehun Nyang
چکیده

The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, proxy signer’s deviation, identifiability, undeniability and verifiability. In this paper, however, we show that their scheme does not provide the proxy signer’s deviation and identifiability requirements. Keyword : proxy signature, threshold proxy signature, anonymous, proxy signer’s deviation, identifiability

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme

In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang’s threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun’s scheme suffered from a drawback and demonstrated an improvement to counter it. In this paper we point out that Hsu’s scheme suffers from an insider attack against their scheme. That is, a malicious proxy signer can forge a va...

متن کامل

Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme

In 2006, Hui-Feng Huang and Chin-Chen Chang proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their scheme, the original signer could know who generated the threshold proxy signature and the receiver could certify the actuality of the proxy group signers who made the proxy signature. However, their scheme had some security weaknesses. In this paper, by id...

متن کامل

Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes

This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...

متن کامل

Efficient Undeniable Threshold Proxy Signature Scheme

The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluate a security of undeniable threshold proxy sign...

متن کامل

On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes

Abstract A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of some nonrepudiable threshold proxy signature schemes with known signers. We show that Sun’s threshold proxy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010