Advanced Search
Volume 30 Issue 1
Jan.  2011
Turn off MathJax
Article Contents
Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218
Citation: Lu Rong-bo, He Da-ke, Wang Chang-ji. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J]. Journal of Electronics & Information Technology, 2008, 30(1): 100-103. doi: 10.3724/SP.J.1146.2006.01218

Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers

doi: 10.3724/SP.J.1146.2006.01218
  • Received Date: 2006-08-17
  • Rev Recd Date: 2006-12-25
  • Publish Date: 2008-01-19
  • In TAMC' 06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings (denoted as BCW scheme) for the first time. As for the security, they claimed their scheme satisfies the security requirements of proxy signature such as strong unforgeability and their scheme need not the secure channel for the delivery of the signed warrant and etc.. In this paper, however, an attack against their scheme is presented. That is, based on the proxy signature generated by proxy signers on a message on behalf of an original signer, an attacker can forge a valid threshold proxy signature on the same message which seemed generated by proxy signers on behalf of this attacker himself. After production a forged proxy signature, the attacker has the same authority with the original signer to the proxy signer, and the verifier cannot distinguish that which one is the real original signer. To thwart this attack, an improvement measure is further proposed, which can resolve the security problem existing in this scheme.
  • loading
  • Mambo M,Usuda K and Okamoto E. Proxy signature: Delegation to sign messages. IEICE Trans. on Fundatamentals, 1996, E79-A(9): 1338-1354.[2]Lal S and Awasthi A K. Proxy blind signature scheme. Available at http:/eprint.iacr. org /2003.[3]Yi Lijiang, Bai Guoqiang, and Xiao Guozhen. Proxy multi- signature scheme[J].Electron.Lett.2000, 36(6):527-528[4]Zhang K. Threshold proxy signature schemes[J].In: Proc of the 1st Intl Information Security Workshop (ISW97), Springer- Verlag.1997, LNCS 1396:191-197[5]Shamir A. How to share a secret[J].Communication of the ACM.1979, 22(11):612-613[6]Boneh D and Franklin M. Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto01, Springer- Verlag, 2001, LNCS 2139: 213-229.[7]Bao Haiyong, Cao Zhenfu, and Wang Shengbao. Indentity- based threshold proxy signature scheme with knows signers[J].The 3nd Annual Conference in Theory and Applications of Models of Computation-TAM06, Springer-Verlag.2006, LNCS 3959:538-546[8]Boneh D, Lynn B, and Shacham H. Short signatures from the Weil pairing[J].In: Boyd C. ed.. Advances in Cryptology- Asiacrypt2001. Springer-Verlag.2001, LNCS 2248:514-532
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3268) PDF downloads(956) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return