A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem

被引:0
|
作者
Kuo, WC
Chen, MY
机构
关键词
proxy signature; RSA; secret sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a threshold proxy signature scheme based on RSA cryptosystem to enhance the flexibility of traditional proxy signature scheme has been proposed by Hwang et al. However this new threshold proxy signature scheme is still unworkable because there is some security weakness, such as the similar to RSA reblocking problem and each proxy signer can not find out the Lagrange coefficient, exist in this new scheme. In this paper we not only give some security flaws to show that their scheme is insecure but also provide a feasible scheme to solve the open problem.
引用
收藏
页码:576 / 579
页数:4
相关论文
共 50 条
  • [31] A robust (k, n)+1 threshold proxy signature scheme based on factoring
    Lu, RX
    Cao, ZF
    Zhu, HJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 35 - 45
  • [32] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [33] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [34] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [35] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [36] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [37] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [38] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [39] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [40] An efficient implementation of a threshold RSA signature scheme
    King, B
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393