Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"

被引:14
|
作者
Wang, GL [1 ]
Bao, F [1 ]
Zhou, JY [1 ]
Deng, RH [1 ]
机构
[1] Inst Infocomm Res, Infocomm Secur Dept, Singapore 119613, Singapore
关键词
proxy signature; digital signature; public key cryptosystem; data security;
D O I
10.1109/TKDE.2004.52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [ 7] recently proposed an efficient (t, n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.
引用
收藏
页码:1309 / 1311
页数:3
相关论文
共 50 条
  • [1] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [2] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [3] A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Kuo, WC
    Chen, MY
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2005, : 576 - 579
  • [4] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [5] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [6] A modified and practical threshold proxy signature scheme based on RSA
    Geng Yong-Jun
    Tian Hui
    Hong Fan
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1958 - +
  • [7] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [8] AN IMPROVED (t, n) THRESHOLD PROXY SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON RSA
    Zhang, Ying
    Yue, Dian-Wu
    Zhang, Huisheng
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (07): : 3205 - 3218
  • [9] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [10] An RSA-based (t, n) threshold proxy signature scheme without any trusted combiner
    Ting, Pei-yih
    Huang, Xiao-Wei
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 277 - 284