Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme

In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the original signer. Any t or more proxy signers can cooperatively sign messages on behalf of the original signer. Recently, Qian et. al. proposed a pairing-based threshold proxy signature scheme. However, we show that their scheme suffers from the forgery attack. That is, an adversary can forge a valid threshold proxy signature on any messages. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or message verifiers, which might violate the original signer's intent. In this paper, we propose an improved scheme that overcomes the above weaknesses.

[1]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.

[2]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[3]  Li Fagen,et al.  Improvement of identity-based threshold proxy signature scheme with known signers , 2006, Wuhan University Journal of Natural Sciences.

[4]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[5]  Zuhua Shao,et al.  Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.

[6]  Chien-Lung Hsu,et al.  Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..

[7]  Zhenfu Cao,et al.  Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers , 2005, Informatica.

[8]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[9]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[10]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[11]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[12]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[13]  Min-Shiang Hwang,et al.  On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..

[14]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[15]  Fagen Li,et al.  Security Analysis of the Pomykala-Barabasz Scheme , 2008, Fundam. Informaticae.

[16]  Min-Shiang Hwang,et al.  An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..