数学季刊 ›› 2010, Vol. 25 ›› Issue (3): 459-463.

• • 上一篇    下一篇

门限代理门限签名方案的密码学分析

  

  1. 1. College of Scienc, Hohai University2. School of Computer Science and Software Engineering, Tianjin Polytechnic University

  • 收稿日期:2008-01-05 出版日期:2010-09-30 发布日期:2023-05-29
  • 作者简介: HAN Jin-guang(1979- ), male, native of Handan, Hebei, a lecturer of Hohai University, M.S.D., engages in cryptography and applied mathematics; KANG Bao-yuan(1965- ), male, native of Fengxiang, Shanxi, Ph.D., a professor of Tianjin Polytechnic University, engages in applied mathematics and cryptography.
  • 基金资助:
    Supported by the National Natural Science Foundation of China(10871205);

Cryptanalysis of Threshold-proxy Threshold-signature Schemes

  1. 1. College of Scienc, Hohai University2. School of Computer Science and Software Engineering, Tianjin Polytechnic University
  • Received:2008-01-05 Online:2010-09-30 Published:2023-05-29
  • About author: HAN Jin-guang(1979- ), male, native of Handan, Hebei, a lecturer of Hohai University, M.S.D., engages in cryptography and applied mathematics; KANG Bao-yuan(1965- ), male, native of Fengxiang, Shanxi, Ph.D., a professor of Tianjin Polytechnic University, engages in applied mathematics and cryptography.
  • Supported by:
    Supported by the National Natural Science Foundation of China(10871205);

摘要: Recently, Hwang et al proposed a (t,n) threshold-proxy (c,m) threshold-signature schemes, in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature. In this scheme, they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers. However, in this paper, we will give a attack to show that their scheme can not resist impersonation attacks.

关键词: cryptanalysis, impersonate attacks, threshold-proxy threshold-signature

Abstract: Recently, Hwang et al proposed a (t,n) threshold-proxy (c,m) threshold-signature schemes, in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature. In this scheme, they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers. However, in this paper, we will give a attack to show that their scheme can not resist impersonation attacks.

Key words: cryptanalysis, impersonate attacks, threshold-proxy threshold-signature

中图分类号: