Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack

被引:10
|
作者
Hsu, CL
Wu, TS
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Fo Guang Univ, Dept Informat, Ilan 262, Taiwan
关键词
digital signature; proxy signature; threshold proxy signature; collusion attack;
D O I
10.1016/j.amc.2004.08.040
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 1999, Sun proposed a nonrepudiable (t,n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n - 1) malicious proxy signers in the proxy group could conspire to impersonate the remainder one. Hwang et al. further proposed an improvement to withstand such an attack. In this paper, however, we will show that Hwang et al.'s improvement is still vulnerable to their proposed collusion attack and unable to achieve the nonrepudiation requirement as they claimed. Finally, we proposed a new efficient nonrepudiable threshold proxy signature scheme not only to eliminate the security leaks but also to be more efficient than Hwang et al.'s scheme in terms of computational complexities and communication costs. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:305 / 319
页数:15
相关论文
共 50 条
  • [21] Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Raman Kumar
    Harsh Kumar Verma
    Renu Dhir
    [J]. Wireless Personal Communications, 2015, 80 : 1281 - 1345
  • [22] Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [23] Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (03) : 1281 - 1345
  • [24] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [25] A new nonrepudiable threshold proxy signature scheme with valid delegation period
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Li, Chun-Ta
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 273 - +
  • [26] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [27] Nonrepudiable proxy multi-signature scheme
    Li, JG
    Cao, ZF
    Zhang, YC
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2003, 18 (03) : 399 - 402
  • [28] Nonrepudiable proxy multi-signature scheme
    JiGuo Li
    ZhenFu Cao
    YiChen Zhang
    [J]. Journal of Computer Science and Technology, 2003, 18 : 399 - 402
  • [29] Bilinear pairings-based threshold proxy signature schemes with known signers
    Xue, QS
    Cao, ZF
    Qian, HF
    [J]. DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 953 - 958
  • [30] On the security of some nonrepudiable threshold proxy signature schemes
    Tan, ZW
    Liu, ZJ
    Wang, MS
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 374 - 385