By Topic

On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Rongbo Lu ; Jishou Univ., Jishou ; Dake He ; Changji Wang

In TAMC 06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings for the first time. In this paper, however, an attack is proposed to show that their scheme have serious security flaws. By this attack, based on the proxy signature generated by proxy signers for a message on behalf of an original signer, an adversary can forge an illegal proxy signature for any message seemed to be generated by proxy signers on behalf of this adversary himself. After producing a forged proxy signature, the adversary has the same authority with the original signer to the proxy signer, and the verifier cannot distinguish that which one is the real original signer. Especially, this attack can be modified forge a valid threshold proxy signature for any message with knowing a previously valid threshold proxy signature generated by proxy signers on behalf of an illegal original signer, and can also be modified to change a proxy signature into a valid threshold signature belonging to the group that actually generates the proxy signatures for any message.

Published in:

Natural Computation, 2007. ICNC 2007. Third International Conference on  (Volume:3 )

Date of Conference:

24-27 Aug. 2007