Efficient Undeniable Threshold Proxy Signature Scheme
نویسندگان
چکیده
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique. Also, we will evaluate a security of undeniable threshold proxy signature scheme with known signers. We find that the existing threshold proxy scheme is insecure versus the original signer forgery. We also demonstrate that a threshold proxy signature suffers from a conspiracy of an original signer and a secret share dealer, and that the scheme is commonly forgeable, and cannot offer undeniable. We claim that the proposed scheme offers the undeniable characteristic.
منابع مشابه
Secure Undeniable Threshold Proxy Signature Scheme
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group to cooperatively sign message on behalf of an original signer. In this paper, we propose a new scheme which includes the features and benefits of the RSA scheme. Also, we will evaluate the security of undeniable threshold proxy signature scheme with known signers. We find that th...
متن کاملA Threshold Undeniable Signature Scheme Without a Trusted Party
At Auscrpt’92, Harn and Yang first proposed the conception of (t, n) threshold undeniable signature, in which only subsets with at least t members can represent a group to generate, confirm or disavow a signature. Later, several schemes are proposed, but none of them is secure. So up to now, how to design a secure (t, n) threshold undeniable signature scheme is remained an open problem. In this...
متن کاملCryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshold proxy signature scheme with known signers are insecure. The malicious original signer can forge a valid threshold proxy signature for any message and any warrant after getting a valid proxy signature. In addition, since ...
متن کاملProxy Confirmation Signatures
The undeniable signature, introduced by Chaum et al. in 1989, provides a nice property that the signer has an additional control over who will benefit from being convinced by the signature. However, a conspicuous drawback of undeniable signature is that the signer may be unavailable or refuse to cooperate. Chaum in 1994 proposed a designated confirmer signature scheme to protect the recipient’s...
متن کاملImprovement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
In 2006, Hui-Feng Huang and Chin-Chen Chang proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their scheme, the original signer could know who generated the threshold proxy signature and the receiver could certify the actuality of the proxy group signers who made the proxy signature. However, their scheme had some security weaknesses. In this paper, by id...
متن کامل