Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack

Chien Lung Hsu*, Tzong Sun Wu

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

16 Scopus citations

Abstract

In 1999, Sun proposed a nonrepudiable (t, n) threshold proxy signature scheme with known signers. Latter, Hwang et al. pointed out Sun's scheme is vulnerable to the so-called collusion attack that (n - 1) malicious proxy signers in the proxy group could conspire to impersonate the remainder one. Hwang et al. further proposed an improvement to withstand such an attack. In this paper, however, we will show that Hwang et al.'s improvement is still vulnerable to their proposed collusion attack and unable to achieve the nonrepudiation requirement as they claimed. Finally, we proposed a new efficient nonrepudiable threshold proxy signature scheme not only to eliminate the security leaks but also to be more efficient than Hwang et al.'s scheme in terms of computational complexities and communication costs.

Original languageEnglish
Pages (from-to)305-319
Number of pages15
JournalApplied Mathematics and Computation
Volume168
Issue number1
DOIs
StatePublished - 01 09 2005
Externally publishedYes

Keywords

  • Collusion attack
  • Digital signature
  • Proxy signature
  • Threshold proxy signature

Fingerprint

Dive into the research topics of 'Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack'. Together they form a unique fingerprint.

Cite this