Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.3.109

Security analysis of a threshold proxy signature scheme using a self-certified public key  

Park, Je-Hong (NSRI)
Kang, Bo-Gyeong (KAIST)
Hahn, Sang-Geun (KAIST)
Abstract
On the research for constructing secure group-oriented proxy signature schemes, there are several proposals of threshold proxy signature schemes which combine the notions of proxy signature with threshold signature. Recently, Hsu and Wu proposed a threshold proxy signature scheme which uses a self-certified public key based on discrete logarithm problem. In this paper, we show that this scheme is vulnerable to original signer's forgery attack. So our attack provides the evidence that this scheme does not satisfy nonrepudiation property.
Keywords
Proxy signature schemes; Proxy threshold signature scheme; Security analysis; Public key cryptosystem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Zhang, 'Threshold proxy signature schemes,' Information Security - ISW '97, Lecture Notes in Comput. Sci. Vol. 1396, pp. 282-290, 1997
2 M.-S. Hwang, E.J.-L. Lu, I.-C. Lin, 'A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE T. Knowl. Data En., Vol.15(6), pp. 1552-1560, 2003   DOI   ScienceOn
3 C.-Y. Yang, S.-F. Tzeng, M.-S. Hwang, 'On the efficiency of nonrepudiable threshold proxy signatures with known signers. J. Syst. Software, Vol.22(9), pp. 1-8, 2003   DOI   ScienceOn
4 Z. Tan, Z. Liu, 'On the security of some nonrepudiable threshold proxy signature schemes with known signers, Cryptology ePrint Archive, Report 2004/234
5 C.-L. Hsu, T.-S. Wu 'Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability,' Appl. Math. Comput., Vol.164(1), pp. 201-225, 2005   DOI   ScienceOn
6 H.M. Sun. 'An efficient nonrepudiable threshold proxy signatures with known signers.' Comput. Commun. Vol. 22(8), pp. 717-722, 1999   DOI   ScienceOn
7 M. Mambo, K. Usuda, E. Okamoto, 'Proxy signatures for delegating signing operation,' Proc. 3rd ACM CCS, pp. 48-57, 1996
8 G. Wang, F. Bao, J. Zhou, R.H. Deng, 'Comments on 'A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem',' IEEE T. Knowl. Data En., Vol. 16(10), pp. 1309-1311, 2004   DOI   ScienceOn
9 C.-L. Hsu, T.-S. Wu, W.-H. He, 'New proxy multi-signature scheme,' Appl. Math. Comput., Vol. 162(3), pp. 1201-1206, 2005   DOI   ScienceOn
10 C.-L. Hsu, T.-S. Wu, 'Efficient proxy signature schemes using self-certified public keys,' Appl. Math. Comput., Vol.152(3), pp. 807-820, 2004   DOI   ScienceOn
11 S. Kim, S. Park, D. Won, 'Proxy signatures, revisited,' Information and Communications Security - ICICS '97, Lecture Notes in Comput. Sci. Vol. 1334, pp. 223-232, 1997
12 Z. Shao, 'Improvement of efficient proxy signature schemes using self-certified public keys,' Appl. Math. Comput., in press, 2005
13 S.-F. Tzeng, M.-S. Hwang, C.-Y. Yang, 'An improvement of nonrepudiable threshold proxy signature scheme with known signers,' Comput. Secur., Vol.23, pp. 174-178, 2004   DOI   ScienceOn
14 C.-L. Hsu, T.-S. Wu, T.-C. Wu, 'New nonrepudiable threshold proxy signature scheme with known signers. J. Syst. Software, vol. 58, pp. 119-124, 2001   DOI   ScienceOn
15 C.-L. Hsu, T.-S. Wu, 'Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack,' Appl. Math. Comput., in press