Cryptanalysis of a threshold proxy signature with known signers
暂无分享,去创建一个
A scheme of threshold proxy signature with known signers was proposed by Hwang et al. In their scheme, the receiver can identify the proxy signers that actually generated proxy signatures. Tzeng et al. demonstrated that this signature scheme is insecure and proposed an improvement to mend the information leakage. This paper shows that the improved scheme is still insecure under the original signer's forgery attack, i.e. insider attack. Our demonstration of insider attack shows that the original signer can freely choose message and delegation warrant and then produces a signature on them.
[1] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[2] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[3] Min-Shiang Hwang,et al. An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..
[4] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.