Cryptology ePrint Archive: Report 2004/054

Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem

Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng

Abstract: In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. recently proposed an efficient (t, n) threshold proxy signature scheme. In this paper we identify several security weaknesses in their scheme and show that their scheme is insecure.

Category / Keywords: public-key cryptography / proxy signature, digital signature, public key cryptosystem, data security.

Publication Info: Comments on “A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem”. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10): 1309-1311, Oct. 2004.

Date: received 22 Feb 2004, last revised 10 Jan 2005

Contact author: glwang at i2r a-star edu sg

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20050110:082701 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]