DocumentCode :
1066031
Title :
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
Author :
Wang, Guilin ; Bao, Feng ; Zhou, Jianying ; Deng, Robert H.
Author_Institution :
Infocomm Security Res., Inst. for Infocomm Res., Singapore, Singapore
Volume :
16
Issue :
10
fYear :
2004
Firstpage :
1309
Lastpage :
1311
Abstract :
In a (t, n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, [M. -S. Hwang et al. (2003) recently proposed an efficient (t, n) threshold proxy signature scheme. We identify several security weaknesses in their scheme and show that their scheme is insecure.
Keywords :
message authentication; public key cryptography; RSA cryptosystem; data security; digital signature; distributed computing; public key cryptosystem; security weaknesses; threshold proxy signature scheme; Data security; Digital signatures; Distributed computing; Grid computing; Mobile agents; Mobile communication; Power generation; Protection; Public key cryptography; Time factors; 65; Index Terms- Proxy signature; data security.; digital signature; public key cryptosystem;
fLanguage :
English
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
1041-4347
Type :
jour
DOI :
10.1109/TKDE.2004.52
Filename :
1324638
Link To Document :
بازگشت