DocumentCode :
485406
Title :
Cryptanalysis of two threshold proxy signature schemes based on RSA cryptosystem
Author :
Fanyu Kong ; Jia Yu ; Baodong Qin ; Ming Li ; Daxing Li
Author_Institution :
Inst. of Network Security, Shandong Univ., Jinan
fYear :
2007
fDate :
12-14 Dec. 2007
Firstpage :
813
Lastpage :
816
Abstract :
In 2003, M.-S. Hwang et al. proposed a (t, n) threshold proxy scheme on RSA cryptosystem, which was proved insecure by G. Wang. Recently, Y.-F. Chang and X. Cheng proposed two improved RSA-based threshold proxy signature schemes respectively. In this paper, we propose the cryptanalysis of two schemes. Firstly, we point out that any t or more proxy signers can cooperatively recover the original singer´s private key and factor the modulus No = poqo in X. Cheng´s scheme. Secondly, we point out that the original signer or the combiner can forge any valid proxy signature in Y.-F. Chang´s scheme. Therefore, neither of two threshold proxy signature schemes can satisfy the security requirements of threshold proxy signature.
Keywords :
cryptography; digital signatures; RSA cryptosystem; cryptanalysis; digital signature; security requirements; threshold proxy signature schemes; Information security and privacy; RSA cryptosystem; digital signature; threshold proxy signature;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Wireless, Mobile and Sensor Networks, 2007. (CCWMSN07). IET Conference on
Conference_Location :
Shanghai
ISSN :
0537-9989
Print_ISBN :
978-0-86341-836-5
Type :
conf
Filename :
4786327
Link To Document :
بازگشت