Abstract
A (t,n) threshold proxy signature scheme enables an original signer or a group of original signers to delegate the signature authority to a proxy group of n members such that not less than t proxy signers can cooperatively sign messages on behalf of the original signer or the original signer group. In the paper, we show that Sun’s and Yang et al.’s threshold proxy signature schemes are insecure against the original signer’s forgery, and that Tzeng et al.’s threshold multi-proxy multi-signature scheme is vulnerable against the actual original signer group’s forgery. We also show that Hsu et al.’s threshold proxy signature scheme suffers from the conspiracy of the original signer and the secret share dealer SA, and that Hwang et al.’s threshold proxy signature scheme is universally forgeable. In other words, none of the above-mentioned schemes holds the unforgeability and provides non-repudiation.
Partially Supported by NSFC(10371127) and NKBRPC(2004CB318000).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights, IACR ePrint Archive (2003), available at http://eprint.iacr.org/2003/096
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Feldman, P.: A Practical Scheme for Non–Interactive Verifiable Secret Sharing. In: Proc. 28th FOCS, pp. 427–437. IEEE, Los Alamitos (1987)
Hsu, C.-L., Wu, T.-S., Wu, T.-C.: New nonrepudiable threshold proxy signature schemem with known signers. The Journal of Systems and Software 58(2001), 119–124 (2001)
Hwang, M.-S., Lin, I.-C., Lu, K.-F.: A secure nonrepudiable threshold proxy signature scheme with known signers. International Journal of Informatica 11(2), 1–8 (2000)
Hwang, M.-S., Lu, E.J.-L., Lin, I.-C.: A practical (t,n) threshold proxy signature scheme bBased on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng. 15(16), 1552–1560 (2003)
Kim, S.J., Park, S.J., Won, D.H.: Proxy Signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Lee, B., Kim, H., Kim, K.: Strong proxy signgture and its applications. In: Proceedings of SCIS 2001, pp. 603–608 (2001)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)
Malkin, T., Obana, S., Yung, M.: The hierarchy of key evovlving signatures and a characterization proxy signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 306–322. Springer, Heidelberg (2004)
Park, H.-U., Lee, L.-Y.: A digital nominative proxy signature scheme for mobile communications. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Pedersen, T.P.: Distributed Provers with Applications to Undeniable Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221–242. Springer, Heidelberg (1991)
Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Sun, H.M.: An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8), 717–722 (1999)
Tzeng, S.-F., Hwang, M.-S., Yang, C.-Y.: An improvement of nonrepudiable threshold proxy signature schemem with known signers. Computers & Security 23, 174–178 (2004)
Tzeng, S.-F., Yang, C.-Y., Hwang, M.-S.: A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Future Generation Computer Systems 20, 887–893 (2004)
Wang, G.-L., Bao, F., Zhou, J.-Y., Deng, R.H.: Comments on A practical (t,n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans. Knowledge and Data Eng. 16(10), 1309–1311 (2004)
Yang, F.-Y., Jan, J.-K., Jeng, W.-J.: Cryptanalysis of a threshold proxy signature with known signers, IACR ePrint Archive (2004), available at http://eprint.iacr.org/2004/313
Yang, C.-Y., Tzeng, S.-F., Hwang, M.-S.: On the efficiency of nonrepudiable threshold proxy signatures with known signers. The Journal of Systems and Software 22(9), 1–8 (2003)
Zhang, K.: Threshold proxy signature schemes. In: Information Security Workshop, Japan, pp. 191–197 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tan, Z., Liu, Z., Wang, M. (2005). On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-540-31979-5_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25584-0
Online ISBN: 978-3-540-31979-5
eBook Packages: Computer ScienceComputer Science (R0)