Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers

被引:0
|
作者
LI Fagen
机构
关键词
identity-based cryptography; threshold proxy signature; bilinear pairings;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
In 2006, Bao et al proposed an identity-based threshold proxy signature scheme with known signers. In this paper, we show that Bao et al ’s scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signer’s intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Bao et al ’s scheme. The improved scheme satisfies all secure requirements for threshold proxy signature.
引用
收藏
页码:1653 / 1656
页数:4
相关论文
共 50 条
  • [1] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [2] On the security of an identity-based threshold proxy signature scheme with known signers
    Lu, Rongbo
    He, Dake
    Wang, Changji
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 210 - +
  • [3] An improvement of nonrepudiable threshold proxy signature scheme with known signers
    Tzeng, SF
    Hwang, MS
    Yang, CY
    COMPUTERS & SECURITY, 2004, 23 (02) : 174 - 178
  • [4] Eliptic curve based threshold proxy signature scheme with known signers
    Institute of Mathematics, Warsaw University, Banacha 2, 02-097 Warszawa, Poland
    Fundam Inf, 2006, 4 (411-425):
  • [5] Eliptic curve based threshold proxy signature scheme with known signers
    Pomykala, Jacek
    Barabasz, Slawomir
    FUNDAMENTA INFORMATICAE, 2006, 69 (04) : 411 - 425
  • [6] An efficient nonrepudiable threshold proxy signature scheme with known signers
    Sun, HM
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 717 - 722
  • [7] An improved nonrepudiable threshold proxy signature scheme with known signers
    Liu, Xin
    Xu, Qiu-Liang
    Shang, Jiu-Qing
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 298 - +
  • [8] New nonrepudiable threshold proxy signature scheme with known signers
    Hsu, CL
    Wu, TS
    Wu, TC
    JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) : 119 - 124
  • [9] Cryanalysis on a nonrepudiable threshold proxy signature scheme with known signers
    Xiao, Hongguang
    Tan, Zuowen
    Jian, Wang
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 809 - +
  • [10] On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
    Yang, CY
    Tzeng, SF
    Hwang, MS
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 507 - 514