DocumentCode
485406
Title
Cryptanalysis of two threshold proxy signature schemes based on RSA cryptosystem
Author
Fanyu Kong ; Jia Yu ; Baodong Qin ; Ming Li ; Daxing Li
Author_Institution
Inst. of Network Security, Shandong Univ., Jinan
fYear
2007
fDate
12-14 Dec. 2007
Firstpage
813
Lastpage
816
Abstract
In 2003, M.-S. Hwang et al. proposed a (t, n) threshold proxy scheme on RSA cryptosystem, which was proved insecure by G. Wang. Recently, Y.-F. Chang and X. Cheng proposed two improved RSA-based threshold proxy signature schemes respectively. In this paper, we propose the cryptanalysis of two schemes. Firstly, we point out that any t or more proxy signers can cooperatively recover the original singer´s private key and factor the modulus No = poqo in X. Cheng´s scheme. Secondly, we point out that the original signer or the combiner can forge any valid proxy signature in Y.-F. Chang´s scheme. Therefore, neither of two threshold proxy signature schemes can satisfy the security requirements of threshold proxy signature.
Keywords
cryptography; digital signatures; RSA cryptosystem; cryptanalysis; digital signature; security requirements; threshold proxy signature schemes; Information security and privacy; RSA cryptosystem; digital signature; threshold proxy signature;
fLanguage
English
Publisher
iet
Conference_Titel
Wireless, Mobile and Sensor Networks, 2007. (CCWMSN07). IET Conference on
Conference_Location
Shanghai
ISSN
0537-9989
Print_ISBN
978-0-86341-836-5
Type
conf
Filename
4786327
Link To Document