Security Analysis of the Pomykala-Barabasz Scheme

In 2006, Pomykala and Barabasz [Fundamenta Informaticae 69 (2006) 411-425] proposed an elliptic curve based threshold proxy signature scheme which requires shorter cryptographic keys. They claimed that their scheme satisfies the secrecy, the proxy protected, the unforgeability, the non-repudiation, and the known signers. However, in this paper, we show that their scheme cannot achieve the proxy protected, the unforgeability and the non-repudiation by demonstrating a conspiracy attack. In this attack, any t malicious proxy signers can collusively impersonate some other proxy signers to generate proxy signatures.

[1]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[2]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[3]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[4]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[5]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[6]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[7]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[8]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[9]  Tzong-Chen Wu,et al.  Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..

[10]  Chin-Chen Chang,et al.  An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers , 2002, Fundam. Informaticae.

[11]  Zhenfu Cao,et al.  A Threshold Proxy Signature Scheme Using Self-Certified Public Keys , 2004, ISPA.

[12]  Min-Shiang Hwang,et al.  An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..

[13]  Min-Shiang Hwang,et al.  On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..

[14]  Zuhua Shao,et al.  Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.

[15]  Chien-Lung Hsu,et al.  Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability , 2005, Appl. Math. Comput..

[16]  Chien-Lung Hsu,et al.  Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..

[17]  Zhenfu Cao,et al.  A robust (k, n) + 1 threshold proxy signature scheme based on factoring , 2005, Appl. Math. Comput..

[18]  Qi Xie,et al.  Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers , 2005, Appl. Math. Comput..

[19]  Jacek Pomykala,et al.  Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers , 2006, Fundam. Informaticae.

[20]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..