首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers
作者姓名:LI Fagen  HU Yupu~   CHEN Jie Key Laboratory of Computer Networks and Information Security  Ministry of Education  Xidian University  Xi’an  Shaanxi  China
作者单位:LI Fagen,HU Yupu~ ,CHEN Jie Key Laboratory of Computer Networks and Information Security,Ministry of Education,Xidian University,Xi’an 710071,Shaanxi,China
摘    要:0 IntroductionIdentity-based (ID-based) cryptography1]is rapidly emer-gingin recent years .The concept of the proxy signature scheme was first in-troduced by Mamboet al2]in 1996 .The concept of thresholdproxy signature was proposed3 ,4]. Apractical and secure (t,n) threshold proxy signature scheme should satisfy the secre-cy,the proxy protected,the unforgeability,the non-repudia-tion,the ti me constraint ,andthe known signers5].In 2006 , Baoet al6]proposed an ID-based thresholdproxy si…

收稿时间:20 May 2006

Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers
LI Fagen,HU Yupu,CHEN Jie.Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers[J].Wuhan University Journal of Natural Sciences,2006,11(6):1653-1656.
Authors:LI Fagen  HU Yupu  CHEN Jie
Institution:(1) Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian University, 710071 Xi'an, Shaanxi, China
Abstract:In 2006, Baoet al proposed an identity-based threshold proxy signature scheme with known signers. In this paper, we show that Baoet al 's scheme is vulnerable to the forgery attack. An adversary can forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature. In addition, their scheme also suffers from the weakness that the proxy signers might change the threshold value. That is, the proxy signers can arbitrarily modify the threshold strategy without being detected by the original signer or verifiers, which might violate the original signer's intent. Furthermore, we propose an improved scheme that remedies the weaknesses of Baoet al 's scheme. The improved scheme satisfies all secure requirements for threshold proxy signature. Foundation item: Supported by the National Natural Science Foundation of China (60473029) Biography: LI Fagen (1979-), male, Ph. D. candidate, research direction: cryptography and information security.
Keywords:identity-based cryptography  threshold proxy signature  bilinear pairings
本文献已被 CNKI 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号