Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers
Lu Rong-bo①②; He Da-ke②; Wang Chang-ji③
①College of Mathematics and Computer Science, Jishou University, Jishou 416000, China;②Laboratory of Information Security and National Computing Gird, Southwest Jiaotong University, Chengdu 610031, China; ③Department of Computer Science, Sun Yat-Sen University, Guangzhou 510275, China
Abstract:In TAMC' 06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings (denoted as BCW scheme) for the first time. As for the security, they claimed their scheme satisfies the security requirements of proxy signature such as strong unforgeability and their scheme need not the secure channel for the delivery of the signed warrant and etc.. In this paper, however, an attack against their scheme is presented. That is, based on the proxy signature generated by proxy signers on a message on behalf of an original signer, an attacker can forge a valid threshold proxy signature on the same message which seemed generated by proxy signers on behalf of this attacker himself. After production a forged proxy signature, the attacker has the same authority with the original signer to the proxy signer, and the verifier cannot distinguish that which one is the real original signer. To thwart this attack, an improvement measure is further proposed, which can resolve the security problem existing in this scheme.
鲁荣波; 何大可;王常吉 . 对一种基于身份的已知签名人的门限代理签名方案的分析[J]. 电子与信息学报, 2008, 30(1): 100-103 .
Lu Rong-bo①②; He Da-ke②; Wang Chang-ji③. Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers. , 2008, 30(1): 100-103 .