Paper 2010/400

Security Analysis of a Threshold Proxy Signature Scheme

Kitae Kim and Dahun Nyang

Abstract

The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, proxy signer's deviation, identifiability, undeniability and verifiability. In this paper, however, we show that their scheme does not provide the proxy signer's deviation and identifiability requirements.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
anonymitycryptanalysisdigital signaturesthreshold cryptography
Contact author(s)
ktkim @ inha ac kr
History
2010-07-16: received
Short URL
https://ia.cr/2010/400
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/400,
      author = {Kitae Kim and Dahun Nyang},
      title = {Security Analysis of a Threshold Proxy Signature Scheme},
      howpublished = {Cryptology ePrint Archive, Paper 2010/400},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/400}},
      url = {https://eprint.iacr.org/2010/400}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.