Abstract
A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signature schemes and various extensions have been considered. As an example, the notion of threshold proxy signature or proxy multi-signature was introduced as a group-oriented variant. In this paper, we show that the threshold proxy signature scheme proposed by Hsu and Wu, and the proxy multi-signature schemes independently proposed by Chen et al. and Hsu et al. are all insecure against the malicious original singer(s). Our result provides a simple example that the way to put the secret parts together should be carefully considered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, T.-S., Chung, Y.-F., Huang, G.-S.: Efficient proxy multi-signature schemes based on the elliptic curve cryptosystem. Comput. Secur. 22(6), 527–534 (2003)
Chen, T.-S., Chung, Y.-F., Huang, G.-S.: A traceable proxy multi-signature scheme based on the elliptic curve cryptosystem. Appl. Math. Comput. 159(1), 137–145 (2004)
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)
Hsu, C.-L., Wu, T.-S.: Efficient proxy signature schemes using self-certified public keys. Appl. Math. Comput. 152(3), 807–820 (2004)
Hsu, C.-L., Wu, T.-S.: Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. Appl. Math. Comput. 164(1), 201–225 (2005)
Hsu, C.-L., Wu, T.-S., He, W.-H.: New proxy multi-signature scheme. Appl. Math. Comput. 162(3), 1201–1206 (2005)
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. 3rd ACM conference on Computer and Communications Security, pp. 48–57. ACM Press, New York (1996)
Park, J.H., Kang, B.G., Park, S.: Cryptanalysis of some group-oriented proxy signature schemes. Full version of this paper, Available at: http://crypt.kaist.ac.kr/jhpark/
Shao, Z.: Improvement of efficient proxy signature schemes using self-certified public keys. Appl. Math. Comput. (in press, 2004)
Wang, G., Bao, F., Zhou, J., Deng, R.H.: Security analysis of some proxy signatures. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 305–319. Springer, Heidelberg (2004)
Xue, Q., Cao, Z.: A threshold proxy signature scheme using self-certified public keys. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds.) ISPA 2004. LNCS, vol. 3358, pp. 715–724. Springer, Heidelberg (2004)
Yi, L., Bai, G., Xizo, G.: Proxy multi-signature scheme: a new type of proxy signature scheme. Electron. Lett. 36(6), 527–528 (2000)
Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J.H., Kang, B.G., Park, S. (2006). Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_2
Download citation
DOI: https://doi.org/10.1007/11604938_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31012-9
Online ISBN: 978-3-540-33153-7
eBook Packages: Computer ScienceComputer Science (R0)