Improvement of Yang et al.'s threshold proxy signature scheme

被引:11
|
作者
Shao, Jun [1 ]
Cao, Zhenfu [1 ]
Lu, Rongxing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; proxy signature; threshold proxy signature;
D O I
10.1016/j.jss.2006.02.047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Since the first (t, n) threshold proxy signature scheme was proposed, the threshold proxy signature has enjoyed a considerable amount of interest from the cryptographic research community. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature scheme with known signer, but the efficiency is rather low and a system authority (SA) is also required in this scheme. Recently, to overcome these shortcomings, Yang et al. proposed an improvement of Hsu et al.'s scheme that is very efficient and without employing a SA. However, in this paper, we shows that Yang et al.'s scheme is not secure against the warrant attack. That is, the adversary can replace the warrant of the proxy signature. To resist this attack, based on Yang et al.'s scheme, we propose a new and more efficient scheme without a secure channel. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 50 条
  • [41] Security analysis of choi et al.'s certificateless short signature scheme
    Chen, Yu-Chi
    Tso, Raylin
    Horng, Gwoboa
    Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154
  • [42] Comments on the security flaw of hwang et al.'s blind signature scheme
    Department of Accounting and Information, The Overseas Chinese Institute of Technology, Taiwan
    不详
    不详
    Int. J. Netw. Secur., 2008, 2 (185-189):
  • [43] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [44] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Shin, Jungpil
    Wang, Kun-hao
    2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
  • [46] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
    Wang, Chao
    Hang, Yunpeng
    Li, Fagen
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +
  • [47] Improvement of a new proxy signature scheme
    Guo, Gang
    Zeng, Guo-Ping
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (01): : 245 - 248
  • [48] Improvement of a Self Proxy Signature Scheme
    Xie, Qi
    ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 643 - 646
  • [49] Attack and improvement of a proxy signature scheme
    Sun, Ying
    Xu, Chun-Xiang
    Wu, Huai
    Chen, Ai-Dong
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (04): : 616 - 619
  • [50] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179