DocumentCode
2328006
Title
Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
Author
Wang, Chao ; Han, Yunpeng ; Li, Fagen
Author_Institution
Sch. of Inf. Eng., Univ. of Sci. & Technol. Beijing, Beijing
fYear
2009
fDate
23-24 May 2009
Firstpage
1
Lastpage
5
Abstract
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the original signer. Any t or more proxy signers can cooperatively sign messages on behalf of the original signer. Recently, Qian et. al. proposed a pairing-based threshold proxy signature scheme. However, we show that their scheme suffers from the forgery attack. That is, an adversary can forge a valid threshold proxy signature on any messages. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or message verifiers, which might violate the original signer´s intent. In this paper, we propose an improved scheme that overcomes the above weaknesses.
Keywords
digital signatures; forgery attack; message verifier; pairing-based threshold proxy signature; proxy signature key; security analysis; Chaos; Computer science; Computer security; Forgery; Information analysis; Information security;
fLanguage
English
Publisher
ieee
Conference_Titel
E-Business and Information System Security, 2009. EBISS '09. International Conference on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-2909-7
Electronic_ISBN
978-1-4244-2910-3
Type
conf
DOI
10.1109/EBISS.2009.5138069
Filename
5138069
Link To Document