Comments on "A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem"

被引:14
|
作者
Wang, GL [1 ]
Bao, F [1 ]
Zhou, JY [1 ]
Deng, RH [1 ]
机构
[1] Inst Infocomm Res, Infocomm Secur Dept, Singapore 119613, Singapore
关键词
proxy signature; digital signature; public key cryptosystem; data security;
D O I
10.1109/TKDE.2004.52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [ 7] recently proposed an efficient (t, n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.
引用
收藏
页码:1309 / 1311
页数:3
相关论文
共 50 条
  • [31] A robust (k, n)+1 threshold proxy signature scheme based on factoring
    Lu, RX
    Cao, ZF
    Zhu, HJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 35 - 45
  • [32] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [33] Cryptanalysis of threshold proxy signature scheme based on factoring
    Liu Feng
    Gao Dong-Mei
    Cui Guang-Hai
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
  • [34] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [35] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [36] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [37] Improvement of threshold proxy signature scheme
    Hsu, CL
    Wu, TS
    Wu, TC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2003, 136 (2-3) : 315 - 321
  • [38] Improvement of threshold proxy signature scheme
    Shao, ZH
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 53 - 59
  • [39] Improvement of a threshold proxy signature scheme
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
  • [40] An efficient implementation of a threshold RSA signature scheme
    King, B
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393