Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"

被引:14
|
作者
Wang, GL [1 ]
Bao, F [1 ]
Zhou, JY [1 ]
Deng, RH [1 ]
机构
[1] Inst Infocomm Res, Infocomm Secur Dept, Singapore 119613, Singapore
关键词
proxy signature; digital signature; public key cryptosystem; data security;
D O I
10.1109/TKDE.2004.52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [ 7] recently proposed an efficient (t, n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.
引用
收藏
页码:1309 / 1311
页数:3
相关论文
共 50 条
  • [21] Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Raman Kumar
    Harsh Kumar Verma
    Renu Dhir
    [J]. Wireless Personal Communications, 2015, 80 : 1281 - 1345
  • [22] Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [23] Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    Dhir, Renu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (03) : 1281 - 1345
  • [24] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Chen, TS
    Liu, TP
    Chung, YF
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
  • [25] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    [J]. Journal of Electronics., 2006, (01) - 57
  • [26] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    [J]. Journal of Electronics(China), 2006, (01) : 54 - 57
  • [27] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [28] Robust T-out-of-N proxy signature based on RSA cryptosystems
    Chang, Ya-Fen
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (02): : 425 - 431
  • [29] An Efficient Scheme based on DLP and RSA for Proxy Group Signature
    Nakum, Bhavesh
    Desai, Urmi
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY RESEARCH (ICAETR), 2014,
  • [30] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243