Tytuł artykułu
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In 2006, Pomykala and Barabasz [Fundamenta Informaticae 69 (2006) 411–425] proposed an elliptic curve based threshold proxy signature scheme which requires shorter cryptographic keys.They claimed that their scheme satisfies the secrecy, the proxy protected, the unforgeability, the non-repudiation, and the known signers. However, in this paper, we show that their scheme cannot achieve the proxy protected, the unforgeability and the non-repudiation by demonstrating a conspiracy attack. In this attack, any t malicious proxy signers can collusively impersonate some other proxy signers to generate proxy signatures.
Słowa kluczowe
Wydawca
Czasopismo
Rocznik
Tom
Strony
453--459
Opis fizyczny
bibliogr. 20 poz.
Twórcy
autor
autor
- School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengda 610054, Sichuan, P.R. China, fagenli@mail.xidian.edu.cn
Bibliografia
- [1] Hsu, C.L., Wu, T.S., Wu, T.C.: New nonrepudiable threshold proxy signature scheme with known signers, Journal of Systems and Software, 58(2), 2001, 119-124.
- [2] Hsu, C.L.,Wu, T.S.,Wu, T.C.: Improvement of threshold proxy signature scheme, Applied Mathematics and Computation, 136(2-3), 2003, 315-321.
- [3] Hsu, C.L., Wu, T.S.: Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack, Applied Mathematics and Computation, 168(1), 2005, 305-319.
- [4] Hsu, C.L.,Wu, T.S.: Self-certified threshold proxy signature schemeswithmessage recovery, nonrepudiation, and traceability, Applied Mathematics and Computation, 164(1), 2005, 201-225.
- [5] Huang, H.F., Chang, C.C.: An efficient and practical (t, n) threshold proxy signature scheme with known signers, Fundamenta Informaticae, 56(3), 2003, 243-253.
- [6] Huang, H.F., Chang, C.C.: A novel efficient (t, n) threshold proxy signature scheme, Information Sciences, 176(10), 2006, 1338-1349.
- [7] Hwang, M.S., Lin, I.C., Lu, E.J.L.: A secure nonrepudiable threshold proxy signature scheme with known signers, Informatica, 11(2), 2000, 1-8.
- [8] Hwang, M.S., Lu, E.J.L., Lin, I.C.: A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem, IEEE Transactions on Knowledge and Data Engineering, 15(6), 2003, 1552-1560.
- [9] Kim, S., Park, S., Won, D.: Proxy signatures, revisited, Proc. Information and Communications Security-ICICS'97 (Y. Han, T. Okamoto, S. Qing, Eds.), LNCS 1334, Springer-Verlag, Berlin, 1997, 223-232.
- [10] Lu, R., Cao, Z., Zhu, H.: A robust (k, n) + 1 threshold proxy signature scheme based on factoring, Applied Mathematics and Computation, 166(1), 2005, 35-45.
- [11] Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign message, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E79-A(9), 1996, 1338-1354.
- [12] Pomykala, J., Barabasz, S.: Elliptic curve based threshold proxy signature scheme with known signers, Fundamenta Informaticae, 69(4), 2006, 411-425.
- [13] Shao, Z.: Improvement of threshold proxy signature scheme, Computer Standards and Interfaces, 27(1), 2004, 53-59.
- [14] Sun, H.M.: An efficient nonrepudiable threshold proxy signature scheme with known signers, Computer Communications, 22(8), 1999, 717-722.
- [15] Sun, H.M., Lee, N.Y., Hwang, T.: Threshold proxy signatures, IEE Proceedings-Computers and Digital Techniques, 146(5), 1999, 259-263.
- [16] Tzeng, S.F., Hwang, M.S., Yang, C.Y.: An improvement of nonrepudiable threshold proxy signature scheme with known signers, Computers & Security, 23(2), 2004, 174-178.
- [17] Xie, Q.: Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers, Applied Mathematics and Computation, 168(2), 2005, 776-782.
- [18] Xue, Q., Cao, Z.: A threshold proxy signature scheme using self-certified public keys, Proc. Parallel and Distributed Processing and Applications-ISPA 2004 (J. Cao, L.T. Yang, M. Guo, F.C.M. Lau, Eds.), LNCS 3358, Springer-Verlag, Berlin, 2004, 715-724.
- [19] Yang, C.Y., Tzeng, S.F., Hwang, M.S.: On the efficiency of nonrepudiable threshold proxy signature scheme with known signers, Journal of Systems and Software, 73(3), 2004, 507-514.
- [20] Zhang, K.: Threshold proxy signature schemes, Proc. Information Security Workshop-ISW'97 (E. Okamoto, G. Davida, M. Mambo, Eds.), LNCS 1396, Springer-Verlag, Berlin, 1997, 191-197.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0014-0022