DocumentCode :
3231526
Title :
Security Analysis and Improvement of a (t, n) Threshold Proxy Signature Scheme
Author :
Kong, Fanyu ; Yu, Jia ; Qin, Baodong ; Li, Ming ; Li, Daxing
Author_Institution :
Shandong Univ., Jinan
Volume :
3
fYear :
2007
fDate :
July 30 2007-Aug. 1 2007
Firstpage :
923
Lastpage :
926
Abstract :
Recently, H. Jiang proposed a (t, n) threshold proxy sig nature scheme based on RSA cryptosystem, in which any t or more proxy signers can cooperatively generate a proxy signature while t-1 or less of them can´t do it. In this paper, we propose a security analysis of H. Jiang´s threshold proxy signature scheme and show that when e>p+q, the original signer can compute the group proxy private key d and then generate any valid proxy signature. Therefore, this scheme doesn ´t satisfy the security properties of threshold proxy signatures when e>p+q. Fortunately, this security weakness can be easily repaired.
Keywords :
cryptography; digital signatures; cryptosystem; security analysis; security improvement; threshold proxy signature; Artificial intelligence; Cryptography; Distributed computing; Educational institutions; Information analysis; Information security; Protection; Protocols; Software engineering; Time factors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-2909-7
Type :
conf
DOI :
10.1109/SNPD.2007.301
Filename :
4287980
Link To Document :
بازگشت