Crypanalysis of Kuo and Chen's threshold proxy signature scheme based on the RSA

Fengying Li, Qingshui Xue, Zhenfu Cao

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

In a (t, n) threshold proxy signature scheme, an original signer delegates a group of n proxy signers to sign messages on behalf of him or her. When the proxy signature is created, t or more proxy signers cooperate to generate valid proxy signatures and any less than t proxy signers can't cooperatively produce valid proxy signatures. In 2003, Hwang et al. proposed a practical threshold proxy signature scheme (HLL-scheme) which is based on RSA cryptosystem for the first time. In 2004, Wang et al. had provided some comments on HLL-scheme. They showed that some mistakes of equations had made HLL-scheme become insecure. Moreover, in 2005, Kuo and Chen also showed two security weaknesses in Hwang et al.'s scheme: one is similar to RSA reblocking problem and the other is that the value of Li is not clearly defined. In addition, to overcome the second shortcoming of HLL-scheme, Kuo and Chen also provided a modified threshold proxy signature scheme (KC-scheme) based on HLL-scheme. By observation, we find that KC-scheme cannot still work. In other words, in KC-scheme, the value of Li cannot still be worked out, as makes KC-scheme not workable. To design a workable threshold proxy signature scheme, based on KC-scheme, an improved scheme is proposed.

Original languageEnglish
Title of host publicationProceedings - International Conference on Information Technology-New Generations, ITNG 2007
Pages815-818
Number of pages4
DOIs
StatePublished - 2007
Externally publishedYes
Event4th International Conference on Information Technology-New Generations, ITNG 2007 - Las Vegas, NV, United States
Duration: 2 Apr 20074 Apr 2007

Publication series

NameProceedings - International Conference on Information Technology-New Generations, ITNG 2007

Conference

Conference4th International Conference on Information Technology-New Generations, ITNG 2007
Country/TerritoryUnited States
CityLas Vegas, NV
Period2/04/074/04/07

Fingerprint

Dive into the research topics of 'Crypanalysis of Kuo and Chen's threshold proxy signature scheme based on the RSA'. Together they form a unique fingerprint.

Cite this