University of Wollongong
Browse

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents

Download (164.44 kB)
journal contribution
posted on 2024-11-16, 09:07 authored by Yong Yu, Yi Mu, Willy SusiloWilly Susilo, Man Ho Allen Au
A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected , meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used in reality after fixing the security problem discovered by Cai et al. In this letter, we provide a detailed analysis on Hong's scheme and show that the scheme fails to achieve the properties of secrecy, proxy protected, undeniability, identifiability and even time constraint and thus adopted of this effiecient construction in practice is not receommended.

Funding

Secure and Efficient Fair Exchange Protocols

Australian Research Council

Find out more...

History

Citation

Yu, Y., Mu, Y., Susilo, W. & Au, M. (2014). Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. Information Processing Letters, 114 (1-2), 5-8.

Journal title

Information Processing Letters

Volume

114

Issue

1/02/2024

Pagination

5-8

Language

English

RIS ID

83872

Usage metrics

    Categories

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC