• DocumentCode
    485406
  • Title

    Cryptanalysis of two threshold proxy signature schemes based on RSA cryptosystem

  • Author

    Fanyu Kong ; Jia Yu ; Baodong Qin ; Ming Li ; Daxing Li

  • Author_Institution
    Inst. of Network Security, Shandong Univ., Jinan
  • fYear
    2007
  • fDate
    12-14 Dec. 2007
  • Firstpage
    813
  • Lastpage
    816
  • Abstract
    In 2003, M.-S. Hwang et al. proposed a (t, n) threshold proxy scheme on RSA cryptosystem, which was proved insecure by G. Wang. Recently, Y.-F. Chang and X. Cheng proposed two improved RSA-based threshold proxy signature schemes respectively. In this paper, we propose the cryptanalysis of two schemes. Firstly, we point out that any t or more proxy signers can cooperatively recover the original singer´s private key and factor the modulus No = poqo in X. Cheng´s scheme. Secondly, we point out that the original signer or the combiner can forge any valid proxy signature in Y.-F. Chang´s scheme. Therefore, neither of two threshold proxy signature schemes can satisfy the security requirements of threshold proxy signature.
  • Keywords
    cryptography; digital signatures; RSA cryptosystem; cryptanalysis; digital signature; security requirements; threshold proxy signature schemes; Information security and privacy; RSA cryptosystem; digital signature; threshold proxy signature;
  • fLanguage
    English
  • Publisher
    iet
  • Conference_Titel
    Wireless, Mobile and Sensor Networks, 2007. (CCWMSN07). IET Conference on
  • Conference_Location
    Shanghai
  • ISSN
    0537-9989
  • Print_ISBN
    978-0-86341-836-5
  • Type

    conf

  • Filename
    4786327