Cryptanalysis of Huang-Chang (t,n) threshold proxy signature scheme
All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Huang and Chang propose an efficient (t,n) threshold proxy signature scheme based on Schnorrs scheme. Compared with previous (t,n) threshold proxy signature scheme whit known signer, their scheme reduce the amount of computations and communications. In this paper we propose an original signer attack to Huang-Chang threshold proxy signature scheme which a malicious original signer able to generate proxy signature on any message, behalf any proxy group with arbitrary warrant and also we propose an improvised scheme that eliminates its weakness.
component Digital signature Proxy signature Threshold proxy signature
Hamid Reza Kakaei Motlagh
Electrical Engineering, Imam Hossein University Tehran, Iran
国际会议
2011 International Conference on Security Science and Technology(ICSST 2011) (2011年安全科学与技术国际会议)
重庆
英文
26-28
2011-01-21(万方平台首次上网日期,不代表论文的发表时间)