PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Security Analysis of the Pomykała-Barabasz Scheme

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In 2006, Pomykala and Barabasz [Fundamenta Informaticae 69 (2006) 411–425] proposed an elliptic curve based threshold proxy signature scheme which requires shorter cryptographic keys.They claimed that their scheme satisfies the secrecy, the proxy protected, the unforgeability, the non-repudiation, and the known signers. However, in this paper, we show that their scheme cannot achieve the proxy protected, the unforgeability and the non-repudiation by demonstrating a conspiracy attack. In this attack, any t malicious proxy signers can collusively impersonate some other proxy signers to generate proxy signatures.
Wydawca
Rocznik
Strony
453--459
Opis fizyczny
bibliogr. 20 poz.
Twórcy
autor
autor
  • School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengda 610054, Sichuan, P.R. China, fagenli@mail.xidian.edu.cn
Bibliografia
  • [1] Hsu, C.L., Wu, T.S., Wu, T.C.: New nonrepudiable threshold proxy signature scheme with known signers, Journal of Systems and Software, 58(2), 2001, 119-124.
  • [2] Hsu, C.L.,Wu, T.S.,Wu, T.C.: Improvement of threshold proxy signature scheme, Applied Mathematics and Computation, 136(2-3), 2003, 315-321.
  • [3] Hsu, C.L., Wu, T.S.: Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack, Applied Mathematics and Computation, 168(1), 2005, 305-319.
  • [4] Hsu, C.L.,Wu, T.S.: Self-certified threshold proxy signature schemeswithmessage recovery, nonrepudiation, and traceability, Applied Mathematics and Computation, 164(1), 2005, 201-225.
  • [5] Huang, H.F., Chang, C.C.: An efficient and practical (t, n) threshold proxy signature scheme with known signers, Fundamenta Informaticae, 56(3), 2003, 243-253.
  • [6] Huang, H.F., Chang, C.C.: A novel efficient (t, n) threshold proxy signature scheme, Information Sciences, 176(10), 2006, 1338-1349.
  • [7] Hwang, M.S., Lin, I.C., Lu, E.J.L.: A secure nonrepudiable threshold proxy signature scheme with known signers, Informatica, 11(2), 2000, 1-8.
  • [8] Hwang, M.S., Lu, E.J.L., Lin, I.C.: A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, 15(6), 2003, 1552-1560.
  • [9] Kim, S., Park, S., Won, D.: Proxy signatures, revisited, Proc. Information and Communications Security-ICICS'97 (Y. Han, T. Okamoto, S. Qing, Eds.), LNCS 1334, Springer-Verlag, Berlin, 1997, 223-232.
  • [10] Lu, R., Cao, Z., Zhu, H.: A robust (k, n) + 1 threshold proxy signature scheme based on factoring, Applied Mathematics and Computation, 166(1), 2005, 35-45.
  • [11] Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign message, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E79-A(9), 1996, 1338-1354.
  • [12] Pomykala, J., Barabasz, S.: Elliptic curve based threshold proxy signature scheme with known signers, Fundamenta Informaticae, 69(4), 2006, 411-425.
  • [13] Shao, Z.: Improvement of threshold proxy signature scheme, Computer Standards and Interfaces, 27(1), 2004, 53-59.
  • [14] Sun, H.M.: An efficient nonrepudiable threshold proxy signature scheme with known signers, Computer Communications, 22(8), 1999, 717-722.
  • [15] Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signatures, IEE Proceedings-Computers and Digital Techniques, 146(5), 1999, 259-263.
  • [16] Tzeng, S.F., Hwang, M.S., Yang, C.Y.: An improvement of nonrepudiable threshold proxy signature scheme with known signers, Computers & Security, 23(2), 2004, 174-178.
  • [17] Xie, Q.: Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers, Applied Mathematics and Computation, 168(2), 2005, 776-782.
  • [18] Xue, Q., Cao, Z.: A threshold proxy signature scheme using self-certified public keys, Proc. Parallel and Distributed Processing and Applications-ISPA 2004 (J. Cao, L.T. Yang, M. Guo, F.C.M. Lau, Eds.), LNCS 3358, Springer-Verlag, Berlin, 2004, 715-724.
  • [19] Yang, C.Y., Tzeng, S.F., Hwang, M.S.: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers, Journal of Systems and Software, 73(3), 2004, 507-514.
  • [20] Zhang, K.: Threshold proxy signature schemes, Proc. Information Security Workshop-ISW'97 (E. Okamoto, G. Davida, M. Mambo, Eds.), LNCS 1396, Springer-Verlag, Berlin, 1997, 191-197.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0014-0022
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.