Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack

被引:10
|
作者
Hsu, CL
Wu, TS
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Fo Guang Univ, Dept Informat, Ilan 262, Taiwan
关键词
digital signature; proxy signature; threshold proxy signature; collusion attack;
D O I
10.1016/j.amc.2004.08.040
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 1999, Sun proposed a nonrepudiable (t,n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n - 1) malicious proxy signers in the proxy group could conspire to impersonate the remainder one. Hwang et al. further proposed an improvement to withstand such an attack. In this paper, however, we will show that Hwang et al.'s improvement is still vulnerable to their proposed collusion attack and unable to achieve the nonrepudiation requirement as they claimed. Finally, we proposed a new efficient nonrepudiable threshold proxy signature scheme not only to eliminate the security leaks but also to be more efficient than Hwang et al.'s scheme in terms of computational complexities and communication costs. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:305 / 319
页数:15
相关论文
共 50 条
  • [41] Attack and improvement of a proxy signature scheme
    Sun, Ying
    Xu, Chun-Xiang
    Wu, Huai
    Chen, Ai-Dong
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (04): : 616 - 619
  • [42] Insider attack on threshold multi-proxy multi-signature scheme
    Zhejiang Natural Science Foundation Committee, Hangzhou 310012, China
    不详
    不详
    [J]. J. Comput. Inf. Syst., 2009, 5 (1375-1380):
  • [43] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [44] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
  • [45] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [46] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [47] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [48] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [49] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [50] Improvement of threshold proxy signature scheme
    Hsu, Chien-Lung
    Wu, Tzong-Sun
    Wu, Tzong-Chen
    [J]. Applied Mathematics and Computation (New York), 2003, 136 (2-3): : 315 - 321