Chinese Quarterly Journal of Mathematics ›› 2010, Vol. 25 ›› Issue (3): 459-463.

Previous Articles     Next Articles

Cryptanalysis of Threshold-proxy Threshold-signature Schemes

  

  1. 1. College of Scienc, Hohai University2. School of Computer Science and Software Engineering, Tianjin Polytechnic University
  • Received:2008-01-05 Online:2010-09-30 Published:2023-05-29
  • About author: HAN Jin-guang(1979- ), male, native of Handan, Hebei, a lecturer of Hohai University, M.S.D., engages in cryptography and applied mathematics; KANG Bao-yuan(1965- ), male, native of Fengxiang, Shanxi, Ph.D., a professor of Tianjin Polytechnic University, engages in applied mathematics and cryptography.
  • Supported by:
    Supported by the National Natural Science Foundation of China(10871205);

Abstract: Recently, Hwang et al proposed a (t,n) threshold-proxy (c,m) threshold-signature schemes, in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature. In this scheme, they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers. However, in this paper, we will give a attack to show that their scheme can not resist impersonation attacks.

Key words: cryptanalysis, impersonate attacks, threshold-proxy threshold-signature

CLC Number: