Computer Science ›› 2012, Vol. 39 ›› Issue (10): 73-77.

Previous Articles     Next Articles

Forgery Attacks on a Series of ID-based Threshold Proxy Signature Schemes

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Recently, YU Y K et al. proposed a series of II}basecf threshold proxy signature in the standard model. This paper constructed three attack algorithms for the latest scheme of YU-ZHENG, with which attacker can forge valid both regular signature on behalf of the original signer and proxy signature of any proxy signer on any message without knowing the signing key of these signers. Our attacking algorithms work well with scheme of YU-ZHENG and the decedent schemes. Attacks show that this series of schemes are unsecure. We analyzed the root cause of attacks and gave some suggestions for modifications in the end.

Key words: Identity based signature, Threshold proxy signature, Forge attack, Bilinear map

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!