Cryptanalysis of some group-oriented proxy signature schemes

  • Authors:
  • Je Hong Park;Bo Gyeong Kang;Sangwoo Park

  • Affiliations:
  • National Security Research Institute, Yuseong-gu, Daejeon, Korea;Department of Mathematics, Korea Advanced Institute of Science and Technology, Yuseong-gu, Daejeon, Korea;National Security Research Institute, Yuseong-gu, Daejeon, Korea

  • Venue:
  • WISA'05 Proceedings of the 6th international conference on Information Security Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signature schemes and various extensions have been considered. As an example, the notion of threshold proxy signature or proxy multi-signature was introduced as a group-oriented variant. In this paper, we show that the threshold proxy signature scheme proposed by Hsu and Wu, and the proxy multi-signature schemes independently proposed by Chen et al. and Hsu et al. are all insecure against the malicious original singer(s). Our result provides a simple example that the way to put the secret parts together should be carefully considered.