Cryptology ePrint Archive: Report 2004/054
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
Abstract: In a (t, n) proxy signature scheme, the original signer can
delegate his/her signing capability to n proxy signers such that
any t or more proxy singers can sign messages on behalf of the
former, but t-1 or less of them cannot do the same thing. Such
schemes have been suggested for use in a number of applications,
particularly in distributed computing where delegation of rights
is quite common. Based on the RSA cryptosystem, Hwang et al.
recently proposed an efficient (t, n) threshold proxy signature
scheme. In this paper we identify several security weaknesses in their scheme and show that their scheme is insecure.
Category / Keywords: public-key cryptography / proxy signature, digital signature, public key cryptosystem, data security.
Publication Info: Comments on “A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem”. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10): 1309-1311, Oct. 2004.
Date: received 22 Feb 2004, last revised 10 Jan 2005
Contact author: glwang at i2r a-star edu sg
Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20050110:082701 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]