International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Security Analysis of a Threshold Proxy Signature Scheme

Authors:
Kitae Kim
Dahun Nyang
Download:
URL: http://eprint.iacr.org/2010/400
Search ePrint
Search Google
Abstract: The t-out-of-n threshold proxy signatures allow an original signer to delegate his signing capability to a group of proxy signers, and t or more proxy signers can generate valid signatures by cooperating. Recently, Liu and Huang proposed a variant of threshold proxy signature scheme in which all proxy signers remain anonymous. The authors claimed their construction satisfies unforgeability, proxy signer's deviation, identifiability, undeniability and verifiability. In this paper, however, we show that their scheme does not provide the proxy signer's deviation and identifiability requirements.
BibTeX
@misc{eprint-2010-23301,
  title={Security Analysis of a Threshold Proxy Signature Scheme},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / anonymity, cryptanalysis, digital signatures, threshold cryptography},
  url={http://eprint.iacr.org/2010/400},
  note={ ktkim@inha.ac.kr 14806 received 15 Jul 2010},
  author={Kitae Kim and Dahun Nyang},
  year=2010
}