On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
نویسندگان
چکیده
In 2004, Tzeng, Yang and Hwang proposed a nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. However, Bao, Cao and Wang pointed out that Tzeng et al.’s scheme cannot resist frame attacks and therefore presented an improved version. In this paper, we will show that there is another security flaw existing in both Tzeng et al.’s scheme and Bao et al.’s scheme.
منابع مشابه
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...
متن کاملOn the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
Abstract A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of some nonrepudiable threshold proxy signature schemes with known signers. We show that Sun’s threshold proxy...
متن کاملCryptanalysis of Threshold Proxy Signature Schemes 1 )
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of two nonrepudiable threshold proxy signature schemes. We show that Tzeng et al.’s threshold proxy signature scheme is...
متن کاملThreshold Proxy Signature Schemes
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability eeciently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a signature. In practice, it is important ...
متن کاملCryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collusion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.’s and Sun’s schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 4 شماره
صفحات -
تاریخ انتشار 2007