File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.ipl.2013.10.006
- Scopus: eid_2-s2.0-84888290222
- WOS: WOS:000328311800002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Title | Security pitfalls of an efficient threshold proxy signature scheme for mobile agents |
---|---|
Authors | |
Keywords | Security analysis Cryptography Digital signature Proxy signature RSA cryptosystem |
Issue Date | 2014 |
Citation | Information Processing Letters, 2014, v. 114, n. 1-2, p. 5-8 How to Cite? |
Abstract | A (t,n) threshold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected, meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used in reality after fixing the security problem discovered by Cai et al. In this letter, we provide a detailed analysis on HongEs scheme and show that the scheme fails to achieve the properties of secrecy, proxy protected, undeniability, identifiability and even time constraint and thus adopted of this efficient construction in practice is not recommended. © 2013 Elsevier B.V. |
Persistent Identifier | http://hdl.handle.net/10722/280800 |
ISSN | 2023 Impact Factor: 0.7 2023 SCImago Journal Rankings: 0.404 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Mu, Yi | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Au, Man Ho | - |
dc.date.accessioned | 2020-02-17T14:34:58Z | - |
dc.date.available | 2020-02-17T14:34:58Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Information Processing Letters, 2014, v. 114, n. 1-2, p. 5-8 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280800 | - |
dc.description.abstract | A (t,n) threshold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected, meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used in reality after fixing the security problem discovered by Cai et al. In this letter, we provide a detailed analysis on HongEs scheme and show that the scheme fails to achieve the properties of secrecy, proxy protected, undeniability, identifiability and even time constraint and thus adopted of this efficient construction in practice is not recommended. © 2013 Elsevier B.V. | - |
dc.language | eng | - |
dc.relation.ispartof | Information Processing Letters | - |
dc.subject | Security analysis | - |
dc.subject | Cryptography | - |
dc.subject | Digital signature | - |
dc.subject | Proxy signature | - |
dc.subject | RSA cryptosystem | - |
dc.title | Security pitfalls of an efficient threshold proxy signature scheme for mobile agents | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.ipl.2013.10.006 | - |
dc.identifier.scopus | eid_2-s2.0-84888290222 | - |
dc.identifier.volume | 114 | - |
dc.identifier.issue | 1-2 | - |
dc.identifier.spage | 5 | - |
dc.identifier.epage | 8 | - |
dc.identifier.isi | WOS:000328311800002 | - |
dc.identifier.issnl | 0020-0190 | - |