Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification

被引:3
|
作者
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran, Iran
关键词
Proxy signature; Threshold proxy signature; Threshold multi-proxy multi-signature scheme; Non-repudiation; IMPROVEMENT; CRYPTANALYSIS; SIGNERS;
D O I
10.1016/j.scient.2011.09.019
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Tzeng et al. proposed a threshold multi-proxy multi-signature scheme with threshold verification. Recently, Hsu et al. pointed out that Tzeng et al.'s scheme was vulnerable to insider attacks and proposed an improvement to eliminate the pointed out security leak. We will show that Hsu et al.'s improvement cannot resist the frame attack. That is, after intercepting a valid proxy signature, an adversary can change the original signers to himself, and forge a proxy signature. To remedy this weakness, we will propose a new method. (c) 2012 Sharif University of Technology. Production and hosting by Elsevier B.V. All rights reserved.
引用
收藏
页码:674 / 679
页数:6
相关论文
共 24 条
  • [1] A non-repudiable multi-proxy multi-signature scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ICIC Express Letters, 2009, 3 (03): : 259 - 263
  • [2] Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Bao, HY
    Cao, ZF
    Wang, SB
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1419 - 1430
  • [3] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Tzeng, SF
    Yang, CY
    Hwang, MS
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
  • [4] A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 9 - 17
  • [5] IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION
    Xie Qi Wang Jilin Yu Xiuyuan (College of Science
    Journal of Electronics(China), 2007, (06) : 806 - 811
  • [6] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    J. Comput. Inf. Syst., 2009, 5 (1375-1380):
  • [7] Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Tsai, Pei-Ling
    INFORMATION SCIENCES, 2007, 177 (02) : 543 - 549
  • [8] A novel nonrepudiable multi-proxy multi-signature scheme with shared verification
    Qu, J. (qulujuan@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [9] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    Journal of Electronics(China), 2006, (04) : 560 - 563
  • [10] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    信息安全与通信保密, 2005, (07) : 133 - 137