会议专题

Cryptanalysis of Huang-Chang (t,n) threshold proxy signature scheme

All previously proposed threshold proxy signature schemes have been based on discrete logarithms required for a protocol to generate and verify a shared secret among the proxy group. Huang and Chang propose an efficient (t,n) threshold proxy signature scheme based on Schnorrs scheme. Compared with previous (t,n) threshold proxy signature scheme whit known signer, their scheme reduce the amount of computations and communications. In this paper we propose an original signer attack to Huang-Chang threshold proxy signature scheme which a malicious original signer able to generate proxy signature on any message, behalf any proxy group with arbitrary warrant and also we propose an improvised scheme that eliminates its weakness.

component Digital signature Proxy signature Threshold proxy signature

Hamid Reza Kakaei Motlagh

Electrical Engineering, Imam Hossein University Tehran, Iran

国际会议

2011 International Conference on Security Science and Technology(ICSST 2011) (2011年安全科学与技术国际会议)

重庆

英文

26-28

2011-01-21(万方平台首次上网日期,不代表论文的发表时间)