A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
نویسندگان
چکیده
A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t−1 or less of them cannot do the same thing. Threshold proxy signatures have been suggested for use in the scenarios of distributed computing where delegation of rights is quite common. In ISPA’04, Xue and Cao proposed a new efficient threshold proxy signature scheme using self-certified public keys. The key advantage of their scheme is that a verifier can simultaneously validate the public keys of the original and proxy signers, and the alleged proxy signature just in a single step. As for the security, they claimed their scheme is secure against internal attacks, external attacks, collusion attacks, and public key substitution attacks. In this paper, however, we successfully identify an insider attack again their scheme. That is, a malicious proxy signer can forge a valid threshold proxy signature on any message. To thwart this attack, some improvements are further proposed.
منابع مشابه
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
In a ) , ( n t threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign messages on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can’t cooperatively generate valid proxy signatures. So far, all of proposed threshold proxy signat...
متن کاملCryptanalysis of A Self-Certified Threshold Proxy Signature Scheme Ased on Elliptic Curve Discrete Logarithm Problem
Digital signatures based on self-certified public key systems are more efficient because the authentication of the users’ public keys can be implicitly accomplished with the signature verification. In 2009, Xue et al. proposed first self-certified threshold proxy signature scheme based on the elliptic curve discrete logarithm problem (ECDLP). In this paper, we show that Xue et al.’s scheme can ...
متن کاملImprovement of Threshold Signature Using Self-certified Public Keys
A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...
متن کاملMessage Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
Multi-proxy signature (MPS) scheme makes a very important branch of the proxy signature scheme family, as they are applicable in many practical situations. The MPS scheme enables the actual signer to pass on their signing authority to plural proxy signers, where each proxy/delegated signer should contribute together to create a genuine MPS to make the whole thing work. In this work, we shall pr...
متن کاملNew Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in e-cash and e-commerce. In this paper, we present a verifiable self-certified public key scheme and a proxy blind signature scheme using the verifiable self-certified public key. The self-certified public key has an advantage which can withstand public key substitution attacks. As far a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004