Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification

Abstract Recently, Tzeng et al. proposed a nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. In their scheme, a subset of original signers can delegate the signing power to a group of the designated proxy signers in such a way that: (i) A valid proxy signature can only be generated by a subset of these proxy signers for a group of the designated verifiers. (ii) The validity of the generated proxy signature can only be verified by a subset of the designated verifiers. This article, however, will demonstrate a security leak inherent in Tzeng et al.’s scheme that any verifier can check the validity of the proxy signature by himself with no help of other verifiers. That is, Tzeng et al.’s scheme cannot achieve their claimed security requirement. Finally, we will propose an improvement to eliminate the pointed out security leak.

[1]  Jean-Jacques Quisquater,et al.  A Signature with Shared Verification Scheme , 1989, CRYPTO.

[2]  Chin-Chen Chang,et al.  An encryption/multisignature scheme with specified receiving groups , 1998 .

[3]  Chin-Chen Chang,et al.  Generalization of Threshold Signature and Authenticated Encryption for Group Communications , 2000 .

[4]  Chin-Chen Chang,et al.  A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..

[5]  Tzong-Chen Wu,et al.  Authenticated encryption scheme with (t, n) shared verification , 1998 .

[6]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[7]  Min-Shiang Hwang,et al.  A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..

[8]  Tzonelih Hwang,et al.  On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.

[9]  Sung-Ming Yen,et al.  Multi-Signature for Specified Group of Verifiers , 1996, J. Inf. Sci. Eng..

[10]  Min-Shiang Hwang,et al.  Generalization of proxy signature based on elliptic curves , 2004, Comput. Stand. Interfaces.

[11]  Hung-Min Sun,et al.  An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..

[12]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[13]  Kan Zhang,et al.  Threshold Proxy Signature Schemes , 1997, ISW.

[14]  Min-Shiang Hwang,et al.  Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..

[15]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[16]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[17]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[18]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[19]  Pla Information A New Multi-proxy Multi-signature Scheme , 2006 .

[20]  Jinn-ke Jan,et al.  A Novel ID-based Group Signature , 1999, Inf. Sci..