File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security pitfalls of an efficient threshold proxy signature scheme for mobile agents

TitleSecurity pitfalls of an efficient threshold proxy signature scheme for mobile agents
Authors
KeywordsSecurity analysis
Cryptography
Digital signature
Proxy signature
RSA cryptosystem
Issue Date2014
Citation
Information Processing Letters, 2014, v. 114, n. 1-2, p. 5-8 How to Cite?
AbstractA (t,n) threshold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected, meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used in reality after fixing the security problem discovered by Cai et al. In this letter, we provide a detailed analysis on HongEs scheme and show that the scheme fails to achieve the properties of secrecy, proxy protected, undeniability, identifiability and even time constraint and thus adopted of this efficient construction in practice is not recommended. © 2013 Elsevier B.V.
Persistent Identifierhttp://hdl.handle.net/10722/280800
ISSN
2023 Impact Factor: 0.7
2023 SCImago Journal Rankings: 0.404
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorYu, Yong-
dc.contributor.authorMu, Yi-
dc.contributor.authorSusilo, Willy-
dc.contributor.authorAu, Man Ho-
dc.date.accessioned2020-02-17T14:34:58Z-
dc.date.available2020-02-17T14:34:58Z-
dc.date.issued2014-
dc.identifier.citationInformation Processing Letters, 2014, v. 114, n. 1-2, p. 5-8-
dc.identifier.issn0020-0190-
dc.identifier.urihttp://hdl.handle.net/10722/280800-
dc.description.abstractA (t,n) threshold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected, meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used in reality after fixing the security problem discovered by Cai et al. In this letter, we provide a detailed analysis on HongEs scheme and show that the scheme fails to achieve the properties of secrecy, proxy protected, undeniability, identifiability and even time constraint and thus adopted of this efficient construction in practice is not recommended. © 2013 Elsevier B.V.-
dc.languageeng-
dc.relation.ispartofInformation Processing Letters-
dc.subjectSecurity analysis-
dc.subjectCryptography-
dc.subjectDigital signature-
dc.subjectProxy signature-
dc.subjectRSA cryptosystem-
dc.titleSecurity pitfalls of an efficient threshold proxy signature scheme for mobile agents-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/j.ipl.2013.10.006-
dc.identifier.scopuseid_2-s2.0-84888290222-
dc.identifier.volume114-
dc.identifier.issue1-2-
dc.identifier.spage5-
dc.identifier.epage8-
dc.identifier.isiWOS:000328311800002-
dc.identifier.issnl0020-0190-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats