Paper 2010/400
Security Analysis of a Threshold Proxy Signature Scheme
Kitae Kim and Dahun Nyang
Abstract
The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, proxy signer's deviation, identifiability, undeniability and verifiability. In this paper, however, we show that their scheme does not provide the proxy signer's deviation and identifiability requirements.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- anonymitycryptanalysisdigital signaturesthreshold cryptography
- Contact author(s)
- ktkim @ inha ac kr
- History
- 2010-07-16: received
- Short URL
- https://ia.cr/2010/400
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/400, author = {Kitae Kim and Dahun Nyang}, title = {Security Analysis of a Threshold Proxy Signature Scheme}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/400}, year = {2010}, url = {https://eprint.iacr.org/2010/400} }