Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'

  • Authors:
  • Guilin Wang;Feng Bao;Jianying Zhou;Robert H. Deng

  • Affiliations:
  • -;-;-;-

  • Venue:
  • IEEE Transactions on Knowledge and Data Engineering
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a (t,n) threshold proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy signers can sign messages on behalf of the former, but t-1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly, in distributed computing where delegation of rights is quite common. Based on the RSA cryptosystem, Hwang et al. [7] recently proposed an efficient (t,n) threshold proxy signature scheme. In this paper, we identify several security weaknesses in their scheme and show that their scheme is insecure.