Skip to main content

On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3439))

Abstract

A (t,n) threshold proxy signature scheme enables an original signer or a group of original signers to delegate the signature authority to a proxy group of n members such that not less than t proxy signers can cooperatively sign messages on behalf of the original signer or the original signer group. In the paper, we show that Sun’s and Yang et al.’s threshold proxy signature schemes are insecure against the original signer’s forgery, and that Tzeng et al.’s threshold multi-proxy multi-signature scheme is vulnerable against the actual original signer group’s forgery. We also show that Hsu et al.’s threshold proxy signature scheme suffers from the conspiracy of the original signer and the secret share dealer SA, and that Hwang et al.’s threshold proxy signature scheme is universally forgeable. In other words, none of the above-mentioned schemes holds the unforgeability and provides non-repudiation.

Partially Supported by NSFC(10371127) and NKBRPC(2004CB318000).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights, IACR ePrint Archive (2003), available at http://eprint.iacr.org/2003/096

  2. Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)

    Google Scholar 

  3. Feldman, P.: A Practical Scheme for Non–Interactive Verifiable Secret Sharing. In: Proc. 28th FOCS, pp. 427–437. IEEE, Los Alamitos (1987)

    Google Scholar 

  4. Hsu, C.-L., Wu, T.-S., Wu, T.-C.: New nonrepudiable threshold proxy signature schemem with known signers. The Journal of Systems and Software 58(2001), 119–124 (2001)

    Article  Google Scholar 

  5. Hwang, M.-S., Lin, I.-C., Lu, K.-F.: A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica 11(2), 1–8 (2000)

    Google Scholar 

  6. Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A practical (t,n) threshold proxy signature scheme bBased on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng. 15(16), 1552–1560 (2003)

    Article  Google Scholar 

  7. Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  8. Lee, B., Kim, H., Kim, K.: Strong proxy signgture and its applications. In: Proceedings of SCIS 2001, pp. 603–608 (2001)

    Google Scholar 

  9. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)

    Chapter  Google Scholar 

  10. Malkin, T., Obana, S., Yung, M.: The hierarchy of key evovlving signatures and a characterization proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Park, H.-U., Lee, L.-Y.: A digital nominative proxy signature scheme for mobile communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  13. Pedersen, T.P.: Distributed Provers with Applications to Undeniable Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)

    Google Scholar 

  14. Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)

    Google Scholar 

  15. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  16. Sun, H.M.: An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8), 717–722 (1999)

    Article  Google Scholar 

  17. Tzeng, S.-F., Hwang, M.-S., Yang, C.-Y.: An improvement of nonrepudiable threshold proxy signature schemem with known signers. Computers & Security 23, 174–178 (2004)

    Article  Google Scholar 

  18. Tzeng, S.-F., Yang, C.-Y., Hwang, M.-S.: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Computer Systems 20, 887–893 (2004)

    Article  Google Scholar 

  19. Wang, G.-L., Bao, F., Zhou, J.-Y., Deng, R.H.: Comments on A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng. 16(10), 1309–1311 (2004)

    Article  Google Scholar 

  20. Yang, F.-Y., Jan, J.-K., Jeng, W.-J.: Cryptanalysis of a threshold proxy signature with known signers, IACR ePrint Archive (2004), available at http://eprint.iacr.org/2004/313

  21. Yang, C.-Y., Tzeng, S.-F., Hwang, M.-S.: On the efficiency of nonrepudiable threshold proxy signatures with known signers. The Journal of Systems and Software 22(9), 1–8 (2003)

    Google Scholar 

  22. Zhang, K.: Threshold proxy signature schemes. In: Information Security Workshop, Japan, pp. 191–197 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tan, Z., Liu, Z., Wang, M. (2005). On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31979-5_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25584-0

  • Online ISBN: 978-3-540-31979-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics