Improvement of Yang et al.'s threshold proxy signature scheme

被引:11
|
作者
Shao, Jun [1 ]
Cao, Zhenfu [1 ]
Lu, Rongxing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; proxy signature; threshold proxy signature;
D O I
10.1016/j.jss.2006.02.047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Since the first (t, n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature scheme with known signer, but the efficiency is rather low and a system authority (SA) is also required in this scheme. Recently, to overcome these shortcomings, Yang et al. proposed an improvement of Hsu et al.'s scheme that is very efficient and without employing a SA. However, in this paper, we shows that Yang et al.'s scheme is not secure against the warrant attack. That is, the adversary can replace the warrant of the proxy signature. To resist this attack, based on Yang et al.'s scheme, we propose a new and more efficient scheme without a secure channel. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 50 条
  • [41] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213
  • [42] Quantum Proxy Threshold Multiple Signature Scheme
    Jing Yu
    Jianhua Zhang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 2709 - 2721
  • [43] A Novel Hybrid Threshold Proxy Signature Scheme
    Yang, Xin
    Zhang, Long
    Li, Chunming
    Li, Guoqiang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 25 - 28
  • [44] A NOVEL EFFICIENT THRESHOLD PROXY SIGNATURE SCHEME
    Zhang, Zhong
    Xu, Qiu-Liang
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 375 - 377
  • [45] A threshold proxy signature scheme with nonrepudiation and anonymity
    Yuan Yumin
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 1002 - 1010
  • [46] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [47] A secure threshold Paillier proxy signature scheme
    Pei-yih Ting
    Xiao-wei Huang
    Jun-hui Wu
    Chia-huei Hseu
    [J]. Journal of Zhejiang University SCIENCE C, 2010, 11 : 206 - 213
  • [48] Quantum Proxy Threshold Multiple Signature Scheme
    Yu, Jing
    Zhang, Jianhua
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (07) : 2709 - 2721
  • [49] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    [J]. Information Systems Frontiers, 2013, 15 : 133 - 139
  • [50] Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 242 - 243