Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In 2006, Pomykala and Barabasz proposed an elliptic curve based threshold proxy signature scheme with known signers. They claimed that their scheme was relatively simple in construction, had the properties of unforgeability and non-repudiation, and admitted the proactive security. Later, Li and Hu pointed out that the scheme of Pomykala and Barabasz was insecure against the conspiracy attack. And then, they proposed an improved scheme. In this paper, we not only show that the threshold proxy signature scheme of Pomykala and Barabasz is universal forgeable, but also show that the improvement of Li and Hu suffers from the rogue key attack.
Wydawca
Czasopismo
Rocznik
Tom
Strony
385--392
Opis fizyczny
Bibliogr. 15 poz.
Twórcy
autor
- Zhejiang University of Science and Technology, No. 318, LiuHe Road, Hangzhou, Zhejiang, 310023, P. R. of China, zhshao 98@yahoo.com
Bibliografia
- [1] Bakker, A., Steen, M., and Anenbaum., A.S.: A law-abiding peer-to-peer network for free-software distribution. In: IEEE International Symposium on Network Computing and Applications, (NCA 2001), pp.60-67, 2001.
- [2] Chen, C.-C., and Hwang, S.-J.: Cryptanalysis of nonrepudiable threshold proxy signature schemes with known signers, International Journal of Informatica, 14(2), pp.205-212, 2003.
- [3] Foster,I., Kesselman, C., Tsudik, G., and Tuecke, S.: A security architecture for computational grids. In: Fifth ACM conference on computers and Communications Security, pp.83-92, 1998.
- [4] Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature, IEE Proc.Comput. Digit. Tech., 141, (5), pp. 307-313, 1994.
- [5] Hwang, M.-S., Lu, E. J.-L., and Lin, I.-C.: A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowledge and Data Engineering, 15(6), pp. 1552-1560, 2003.
- [6] Leiwo, J., Hanle, C., Homburg, P., and Tanenbaum, A.S.: Disallowing unauthorized state changes of distributed shared objects, In: Information Security for Global Information Infrastructures (SEC'00), pp. 381-390, 2000.
- [7] Li, F., and Hu, Y.: Security Analysis of the Pomyka?a-Barabasz Scheme, Fundamenta Informaticae, 80(4). pp.453-462, 2007.
- [8] Lee, B., Kim, H., and Kim, K.: Strong proxy signature and its applications, In: Proceeding of the 2001 symposium on cryptography and information security (SCIS'01), Vol. 2/2, pp. 603-608, 2001.
- [9] Malkin, T., Obana, S., and Yung, M.: The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. In: EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 306-322, 2004.
- [10] Mambo, M., Usuda, K., and Okamoto, E.: Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundam., E79-A, (9), pp.1338-1354, 1996.
- [11] Park, H.-U., and Lee, I.-Y.: A digital nominative proxy signature scheme for mobile communication, In: Information and Communications Security (ICICS 2001), LNCS 2229, Springer-Verlag, pp.451-455, 2001.
- [12] Pedersen, T.: 'Distributed provers with application to undeniable signatures', In: Proc. EUROCRYPT'91, LNCS 547, Springer-Verlag, pp.221-238, 1991..
- [13] Pomykala, J., and Barabasz, S.: Elliptic curve based threshold proxy signature scheme with known signers, Fundamenta Informaticae, 69, pp.411-425, 2006.
- [14] Ristenpart, T., and Yilek, S.: The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. In: Advances in Cryptology - EUROCRYPT 2007, LNCS 4515, Springer-Verlag, pp.228-245, 2007.
- [15] Tan, Z., Liu, Z., andWang, M.. On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. In: Information Security Practice and Experience (ISPEC 2005), LNCS 3439, Springer-Verlag, pp. 374-385, 2005..
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0011-0037