Cryptanalysis of Some Group-Oriented Proxy Signature Schemes

A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signature schemes and various extensions have been considered. As an example, the notion of threshold proxy signature or proxy multi-signature was introduced as a group-oriented variant. In this paper, we show that the threshold proxy signature scheme proposed by Hsu and Wu, and the proxy multi-signature schemes independently proposed by Chen et al. and Hsu et al. are all insecure against the malicious original singer(s). Our result provides a simple example that the way to put the secret parts together should be carefully considered.

[1]  Qi Xie,et al.  Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes , 2006, Int. J. Netw. Secur..

[2]  Zhenfu Cao,et al.  Proxy signature scheme using self-certified public keys , 2004, Appl. Math. Comput..

[3]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[4]  Zhenfu Cao,et al.  Improvement of Yang et al.'s threshold proxy signature scheme , 2007, J. Syst. Softw..

[5]  Min-Shiang Hwang,et al.  An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..

[6]  Chien-Lung Hsu,et al.  Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability , 2005, Appl. Math. Comput..

[7]  Zuhua Shao,et al.  Improvement of efficient proxy signature schemes using self-certified public keys , 2005, Appl. Math. Comput..

[8]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[9]  Chien-Lung Hsu,et al.  Efficient proxy signature schemes using self-certified public keys , 2004, Appl. Math. Comput..

[10]  Jiqiang Lu,et al.  Security Weaknesses in Two Proxy Signature Schemes , 2006, ICCSA.

[11]  Zuhua Shao Improvement of digital signature with message recovery using self-certified public keys and its variants , 2004, Appl. Math. Comput..

[12]  Robert H. Deng,et al.  Security Analysis of Some Proxy Signatures , 2003, ICISC.

[13]  Zhenfu Cao,et al.  A Threshold Proxy Signature Scheme Using Self-Certified Public Keys , 2004, ISPA.

[14]  Min-Shiang Hwang,et al.  A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..

[15]  Yu-Fang Chung,et al.  A traceable proxy multisignature scheme based on the elliptic curve cryptosystem , 2004, Appl. Math. Comput..

[16]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[17]  Mingsheng Wang,et al.  On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.

[18]  Robert H. Deng,et al.  Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..

[19]  Min-Shiang Hwang,et al.  On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..

[20]  Yu-Fang Chung,et al.  Efficient proxy multisignature schemes based on the elliptic curve cryptosystem , 2003, Comput. Secur..

[21]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[22]  Chien-Lung Hsu,et al.  Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..

[23]  Hung-Min Sun,et al.  Cryptanalysis of a Threshold Proxy Signature Scheme , 2004 .

[24]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[25]  Yumin Yuan,et al.  Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes , 2005, Secure Data Management.

[26]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.