Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack

被引:10
|
作者
Hsu, CL
Wu, TS
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Fo Guang Univ, Dept Informat, Ilan 262, Taiwan
关键词
digital signature; proxy signature; threshold proxy signature; collusion attack;
D O I
10.1016/j.amc.2004.08.040
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 1999, Sun proposed a nonrepudiable (t,n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n - 1) malicious proxy signers in the proxy group could conspire to impersonate the remainder one. Hwang et al. further proposed an improvement to withstand such an attack. In this paper, however, we will show that Hwang et al.'s improvement is still vulnerable to their proposed collusion attack and unable to achieve the nonrepudiation requirement as they claimed. Finally, we proposed a new efficient nonrepudiable threshold proxy signature scheme not only to eliminate the security leaks but also to be more efficient than Hwang et al.'s scheme in terms of computational complexities and communication costs. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:305 / 319
页数:15
相关论文
共 50 条
  • [1] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [2] Cryanalysis on a nonrepudiable threshold proxy signature scheme with known signers
    Xiao, Hongguang
    Tan, Zuowen
    Jian, Wang
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 809 - +
  • [3] On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
    Yang, CY
    Tzeng, SF
    Hwang, MS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 507 - 514
  • [4] An improvement of nonrepudiable threshold proxy signature scheme with known signers
    Tzeng, SF
    Hwang, MS
    Yang, CY
    [J]. COMPUTERS & SECURITY, 2004, 23 (02) : 174 - 178
  • [5] An improved nonrepudiable threshold proxy signature scheme with known signers
    Liu, Xin
    Xu, Qiu-Liang
    Shang, Jiu-Qing
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 298 - +
  • [6] New nonrepudiable threshold proxy signature scheme with known signers
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 119 - 124
  • [7] Analysis and Correction on a Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
    Sun, Fang
    Qi, Chuanda
    Niu, Lu
    Zhang, Yuna
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 176 - 179
  • [8] Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers
    Hwang, SJ
    Chen, CC
    [J]. INFORMATICA, 2003, 14 (02) : 205 - 212
  • [9] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [10] An efficient and practical (t, n) threshold proxy signature scheme with known signers
    Huang, HF
    Chang, CC
    [J]. FUNDAMENTA INFORMATICAE, 2003, 56 (03) : 243 - 253