The Community for Technology Leaders
Green Image
In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [7] recently proposed an efficient (t,n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.
Proxy signature, digital signature, public key cryptosystem, data security.
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng, "Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'", IEEE Transactions on Knowledge & Data Engineering, vol. 16, no. , pp. 1309-1311, October 2004, doi:10.1109/TKDE.2004.52
80 ms
(Ver 3.3 (11022016))