About the Security for HW threshold proxy signature scheme with self-certified public key system

  • Fengying Li*
  • , Qingshui Xue
  • , Jiping Zhang
  • , Zhenfu Cao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In a (t, n) threshold proxy signature scheme, one original signer delegates a group of n proxy signers to sign on behalf of the original signer. When the proxy signature is created, at least t proxy signers cooperate to produce valid proxy signatures and any less than I proxy signers can't cooperatively generate valid proxy signatures. Self-certified public key systems have attracted more and more attention because of its advantages. In 2005, Hsu and Wu designed a self-certified threshold proxy signature scheme with message recovery, nonrepudiation and traceability, which is based on Hsu et al.'s self-certified public key system. Park et al. showed that Hsu and Wu's self-certified threshold proxy signature scheme is insecure against the malicious original signer in 2006. That is, Hsu and Wu's scheme suffers from the cheat attack, where a malicious original signer can cheat CA into extracting a proxy signing key of a proxy signer. We analyzed Park et al's security analysis for Hsu and Wu's scheme and pointed out that the cheat attack proposed by Park et al. can't succeed. In one hand, in self-certified public system, users cannot freely change their private or public keys. If users want to change their private or public keys, CA has some corresponding strategy to limit users' behaviors. In the other hand, if some disagreement about the forged threshold proxy signature occurs, there are two solutions to deal with it. One solution depends on the help of CA and the other solution relies on the help of the delegated proxy signer.

Original languageEnglish
Title of host publication2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
Pages376-380
Number of pages5
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 4th International Conference on Communications and Networking in China, CHINACOM 2009 - Xian, China
Duration: 26 Aug 200928 Aug 2009

Publication series

Name2009 4th International Conference on Communications and Networking in China, CHINACOM 2009

Conference

Conference2009 4th International Conference on Communications and Networking in China, CHINACOM 2009
Country/TerritoryChina
CityXian
Period26/08/0928/08/09

Keywords

  • Cryptography
  • Digital signatures
  • Proxy signature
  • Self-certified
  • Threshold proxy signature

Fingerprint

Dive into the research topics of 'About the Security for HW threshold proxy signature scheme with self-certified public key system'. Together they form a unique fingerprint.

Cite this