2006 | OriginalPaper | Buchkapitel
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
verfasst von : Je Hong Park, Bo Gyeong Kang, Sangwoo Park
Erschienen in: Information Security Applications
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signature schemes and various extensions have been considered. As an example, the notion of threshold proxy signature or proxy multi-signature was introduced as a group-oriented variant. In this paper, we show that the threshold proxy signature scheme proposed by Hsu and Wu, and the proxy multi-signature schemes independently proposed by Chen
et al.
and Hsu
et al.
are all insecure against the malicious original singer(s). Our result provides a simple example that the way to put the secret parts together should be carefully considered.