An RSA-based (t, n) threshold proxy signature scheme with freewill identities

نویسندگان

  • Ya-Fen Chang
  • Chin-Chen Chang
چکیده

Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on the RSA cryptosystem. Later, Wang et al. (2004a) indicated that this scheme was insecure because the original signer’s private key could be derived. Moreover, the delegates’ identities had to be chosen carefully. In this paper, we propose an improved RSA-based (t, n) threshold proxy signature scheme, which withstands this security flaw and also offers the convenience of choosing identities at will.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of a Threshold Proxy Signature Scheme∗

A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group of n proxy signers to sign messages on behalf of an original signer. Recently, Hwang et al. proposed a new (t, n) threshold proxy signature scheme based on the RSA cryptosystem. In this paper, we show that their scheme is insecure against the original signer’s forgery and the general forgery.

متن کامل

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem

In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t − 1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite commo...

متن کامل

Attacks on a threshold proxy signature scheme based on the RSA cryptosystem

Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...

متن کامل

An Improved Threshold Proxy Signature Scheme Based on RSA

This paper proposes an improved RSA-based threshold proxy signature scheme. The proposed scheme satisfies the necessary security requirements of proxy signature such as verifiability, unforgeability, threshold property and identifiability. The proposed scheme does not require any secure channel to deliver the proxy keys any more. Introduction A proxy signature scheme involves three entities: an...

متن کامل

Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem"

In a ðt; nÞ threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperatively issue a proxy signature on behalf of the original signer, but ðtÿ 1Þ or less proxy signers cannot. Previously, all of the proposed threshold proxy signature schemes have been based on the di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJICS

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2007