A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem

被引:0
|
作者
Kuo, WC
Chen, MY
机构
关键词
proxy signature; RSA; secret sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a threshold proxy signature scheme based on RSA cryptosystem to enhance the flexibility of traditional proxy signature scheme has been proposed by Hwang et al. However this new threshold proxy signature scheme is still unworkable because there is some security weakness, such as the similar to RSA reblocking problem and each proxy signer can not find out the Lagrange coefficient, exist in this new scheme. In this paper we not only give some security flaws to show that their scheme is insecure but also provide a feasible scheme to solve the open problem.
引用
收藏
页码:576 / 579
页数:4
相关论文
共 50 条
  • [1] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [2] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [3] Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"
    Wang, GL
    Bao, F
    Zhou, JY
    Deng, RH
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (10) : 1309 - 1311
  • [4] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [5] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [6] A modified and practical threshold proxy signature scheme based on RSA
    Geng Yong-Jun
    Tian Hui
    Hong Fan
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +
  • [7] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [8] AN IMPROVED (t, n) THRESHOLD PROXY SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON RSA
    Zhang, Ying
    Yue, Dian-Wu
    Zhang, Huisheng
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (07): : 3205 - 3218
  • [9] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [10] An RSA-based (t, n) threshold proxy signature scheme without any trusted combiner
    Ting, Pei-yih
    Huang, Xiao-Wei
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 277 - 284