Paper 2004/054

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem

Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng

Abstract

In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. recently proposed an efficient (t, n) threshold proxy signature scheme. In this paper we identify several security weaknesses in their scheme and show that their scheme is insecure.

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Comments on “A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem”. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10): 1309-1311, Oct. 2004.
Keywords
proxy signaturedigital signaturepublic key cryptosystemdata security.
Contact author(s)
glwang @ i2r a-star edu sg
History
2005-01-10: revised
2004-02-23: received
See all versions
Short URL
https://ia.cr/2004/054
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/054,
      author = {Guilin Wang and Feng Bao and Jianying Zhou and Robert H.  Deng},
      title = {Comments on a Threshold Proxy Signature Scheme Based on the {RSA} Cryptosystem},
      howpublished = {Cryptology {ePrint} Archive, Paper 2004/054},
      year = {2004},
      url = {https://eprint.iacr.org/2004/054}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.