Improvement of Yang et al.'s threshold proxy signature scheme

被引:11
|
作者
Shao, Jun [1 ]
Cao, Zhenfu [1 ]
Lu, Rongxing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; proxy signature; threshold proxy signature;
D O I
10.1016/j.jss.2006.02.047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Since the first (t, n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature scheme with known signer, but the efficiency is rather low and a system authority (SA) is also required in this scheme. Recently, to overcome these shortcomings, Yang et al. proposed an improvement of Hsu et al.'s scheme that is very efficient and without employing a SA. However, in this paper, we shows that Yang et al.'s scheme is not secure against the warrant attack. That is, the adversary can replace the warrant of the proxy signature. To resist this attack, based on Yang et al.'s scheme, we propose a new and more efficient scheme without a secure channel. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 50 条
  • [31] Traceability on Stadler et al.'s fair blind signature scheme
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Lai, Yan-Chi
    2003, Institute of Electronics, Information and Communication, Engineers, IEICE (E86-A)
  • [33] Cryptanalysis and improvement of a threshold proxy signature scheme from bilinear pairings
    College of Math and Computer Science, Jishou University, Jishou 416000, China
    不详
    不详
    Tien Tzu Hsueh Pao, 2007, 1 (145-149):
  • [34] Security analysis and improvement of a (t, n) threshold proxy signature scheme
    Kong, Fanyu
    Yu, Jia
    Qin, Baodong
    Li, Ming
    Li, Daxing
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 923 - +
  • [35] Attacks and solutions of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    INFORMATICA, 2005, 16 (02) : 285 - 294
  • [36] Weakness and solution of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 295 - 304
  • [37] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [38] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [39] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [40] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382