|
|
Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers |
Lu Rong-bo①②; He Da-ke②; Wang Chang-ji③ |
①College of Mathematics and Computer Science, Jishou University, Jishou 416000, China;②Laboratory of Information Security and National Computing Gird, Southwest Jiaotong University, Chengdu 610031, China; ③Department of Computer Science, Sun Yat-Sen University, Guangzhou 510275, China |
|
|
Abstract In TAMC' 06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings (denoted as BCW scheme) for the first time. As for the security, they claimed their scheme satisfies the security requirements of proxy signature such as strong unforgeability and their scheme need not the secure channel for the delivery of the signed warrant and etc.. In this paper, however, an attack against their scheme is presented. That is, based on the proxy signature generated by proxy signers on a message on behalf of an original signer, an attacker can forge a valid threshold proxy signature on the same message which seemed generated by proxy signers on behalf of this attacker himself. After production a forged proxy signature, the attacker has the same authority with the original signer to the proxy signer, and the verifier cannot distinguish that which one is the real original signer. To thwart this attack, an improvement measure is further proposed, which can resolve the security problem existing in this scheme.
|
Received: 17 August 2006
|
|
|
|
|
|
|
|